Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs

From MaRDI portal
Publication:897709

DOI10.1515/JMC-2014-0031zbMATH Open1403.94073arXiv1403.1468OpenAlexW2963924363MaRDI QIDQ897709FDOQ897709

Maura Paterson, D. R. Stinson

Publication date: 7 December 2015

Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)

Abstract: We study a method for key predistribution in a network of n users where pairwise keys are computed by hashing users' IDs along with secret information that has been (pre)distributed to the network users by a trusted entity. A communication graph G can be specified to indicate which pairs of users should be able to compute keys. We determine necessary and sufficient conditions for schemes of this type to be secure. We also consider the problem of minimizing the storage requirements of such a scheme; we are interested in the total storage as well as the maximum storage required by any user. Minimizing the total storage is NP-hard, whereas minimizing the maximum storage required by a user can be computed in polynomial time.


Full work available at URL: https://arxiv.org/abs/1403.1468




Recommendations





Cited In (2)





This page was built for publication: Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q897709)