Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
letter
. 2015 Sep 29;15(10):25033–25038. doi: 10.3390/s151025033

A Note on an Improved Self-Healing Group Key Distribution Scheme

Hua Guo 1,2,*, Yandong Zheng 2, Biao Wang 3, Zhoujun Li 1,2
Editor: Leonhard M Reindl
PMCID: PMC4634393  PMID: 26426018

Abstract

In 2014, Chen et al. proposed a one-way hash self-healing group key distribution scheme for resource-constrained wireless networks in the journal of Sensors (14(14):24358-24380, doi: 10.3390/s141224358). They asserted that their Scheme 2 achieves mt-revocation capability, mt-wise forward secrecy, any-wise backward secrecy and has mt-wise collusion attack resistance capability. Unfortunately, this paper pointed out that their scheme does not satisfy the forward security, mt-revocation capability and mt-wise collusion attack resistance capability.

Keywords: self-healing group key distribution, forward security, backward secrecy, collusion attack

1. Introduction

Group communication includes a group manager (GM) and some group members, in which all of the group members share a common session key which is distributed by GM. In order to achieve secure group communication in unreliable wireless networks, Staddon et al. [1] introduced a group key distribution scheme with self-healing mechanism, which allows a group member to recover session keys even if he doesn’t receive the corresponding broadcast messages because of packet loss, without requesting anything to the group manager. Recently, Chen et al. [2] developed two schemes to realize the self-healing group key distribution based on one-way hash chain. The proposed Scheme 2 has the constant storage overhead and low communication overhead, thus is very suitable for the resource-constrained wireless networks. They assert that their scheme is secure, i.e., satisfies mt-revocation capability, mt-wise forward secrecy, any-wise backward secrecy and resistance to mt-wise collusion attack. Unfortunately, we found a revoked user can recover other legitimate users’ personal secrets which can be used to recover the current session’s session key, this directly breaks the forward security, mt-revocation capability and mt-wise collusion attack resistance capability. Thus, Chen et al.’s Scheme 2 is insecure.

2. Overview of Chen et al.’s Scheme

Chen et al.’s self-healing group key distribution Scheme 2 includes five parts: Set up, Broadcast in session j, Group session key recovery and self-healing, Group member addition and Group member revocation. Here we only describe the first three parts which is helpful to understand the attack.

  • (1)

    Set up

    The GM selects a random 2t-degree polynomial s1(x)=a0+a1x++a2tx2t and a random t-degree polynomial s2(x)=b0+b1x++btxt from Fq[x]. Then, the GM chooses a random value ε1 from Fq. The GM sends the user’s personal secret Si={ε1·s1(i),ε1·s2(i)} to a user via a secure channel.

  • (2)

    Broadcast in session j (for 1jm)

    Let Rj={Rj1,Rj2,,Rjj,,Rjj} be the set of revoked users before and in session j, where Rjj is the set of users who join the group in session j and are revoked before and in session j. Rjj={Ur1j,Ur2j,,Urwjj} and |Rjj|=wjt. r1j,r2j,,rwjj are the IDs of users in Rjj. Rjj= if no users joined the group in session j.

    • -
      The GM chooses a random value kj0Fq and a one-way hash function h(·). Note that hi(·) denotes applying i times hash operation. Then GM constructs the j-th key chain for session j: {kj1,kj2,,kjj}, where
      kj1=h(kj0)kj2=h(kj1)=h(h(kj0))=h2(kj0),kjj=h(kjj1)=h(h(kjj2))==hj(kj0)
      For security, kj0(1jm) is different from each other.
      The GM splits the kjj into two t-degree polynomials, Ujj(x) and Vjj(x), where
      kjj=Ujj(x)+Vjj(x),j=1,2,,j
    • -
      To construct the revocation polynomials for session j, the GM firstly chooses number sets R¯jj, where R¯jj={r¯1j,r¯2j,,r¯twjj} are random numbers which are not used as a user ID and different from each other. Then, the GM computes
      Ajj(x)=Πz=1|Rjj|(xrzj)Πz=1t|Rjj|(xr¯zj),j=1,2,,j
    • -
      The GM chooses a random session key Kj from Fq. Then, the GM computes
      Mjj(x)=Ajj(x)·Ujj(x)+εj·s1(x)
      and
      Njj(x)=Vjj(x)+εj·s2(x)
      After that, the GM broadcasts the message
      Bj=RjR¯j{Mjj(x)|j=1,2,,j}{Njj(x)|j=1,2,,j}{Ekjj(Kj)|j=1,2,,j}
      where R¯j={R¯j1,R¯j2,,R¯jj} and Ek(·) is a symmetric encryption function.
  • (3)

    Group session key recovery and self-healing

    Any legitimate user UiGjj can recover the j-th session key when he receives the broadcast message Bj as follows.

    • -
      Ui uses his personal secret εj·s1(i) and εj·s2(i) to compute
      Ujj(i)=Mjj(i)εj·s1(i)Ajj(i)
      and
      Vjj(i)=Njj(i)εj·s2(i)
      Then, Ui computes kjj=Ujj(i)+Vjj(i).
    • -

      Ui uses the hash function h(·) to compute all {kjj} for j<jj in the j-th key chain.

    • -

      Ui recovers the session keys {Kj}(j<jj) by decrypting Ekjj(Kj)(j<jj) with corresponding keys {kjj}(j<jj).

3. Cryptanalysis of Chen et al.’s Scheme 2

In this section we exhibit the attack on Chen et al.’s Scheme 2 step by step, and explain why this attack exists.

3.1. Attack on Chen et al.’s Scheme 2

Let Gj1j denote the users who join the group in session j and are still legitimate in session j1 where j<j1. Suppose that UiGj1j and Ui is revoked in session j2(j<j1<j2). Now we are ready to show how Ui, who is revoked in session j2, recovers the personal secret of another user who is legitimate in session j2, furthermore uses this personal secret to compute the session key Kj2 which should be kept secret from Ui.

  • Step 1. Ui computes kjj and kj1j with his personal key Si and the broadcast messages Mjj(x), Njj(x) and Mj1j(x), Nj1j(x).

  • Step 2. In session j, Ui receives the broadcast messages Mjj(x),Njj(x), where
    Mjj(x)=Ajj(x)·Ujj(x)+εj·s1(x) (1)
    and
    Njj(x)=Vjj(x)+εj·s2(x) (2)
    Note that kjj=Ujj(x)+Vjj(x), Equation (2) can be converted to Njj(x)=kjjUjj(x)+εj·s2(x).
    Let Equation (1) + Ajj(x)·Equation(2), Ui can obtain
    Mjj(x)+Ajj(x)·Njj(x)=kjj·Ajj(x)+εj·s1(x)+Ajj(x)·εj·s2(x) (3)
    With the values of kjj which is computed from step (1), Ui can obtain
    Mjj(x)+Ajj(x)·Njj(x)Ajj(x)·kjj=εj·s1(x)+Ajj(x)·εj·s2(x) (4)
  • Step 3. Since Ui is legitimate in session j1, Ui can obtain the similar result in the same way:
    Mj1j(x)+Aj1j(x)·Nj1j(x)Aj1j(x)·kj1j=εj·s1(x)+Aj1j(x)·εj·s2(x) (5)
    Let Equation (4) – Equation (5), user Ui can obtain
    Mjj(x)+Ajj(x)·Njj(x)Ajj(x)·kjjMj1j(x)Aj1j(x)·Nj1j(x)+Aj1j(x)·kj1j=(Ajj(x)Aj1j(x))·εj·s2(x) (6)
  • Step 4. Ui computes εj·s2(x) as
    εj·s2(x)=Mjj(x)+Ajj(x)·Njj(x)Ajj(x)·kjjMj1j(x)Aj1j(x)·Nj1j(x)+Aj1j(x)·kj1j(Ajj(x)Aj1j(x)) (7)
    Take εj·s2(x) to Equation (3), Ui computes εj·s1(x) as
    εj·s1(x)=Mjj(x)+Ajj(x)·Njj(x)Ajj(x)·kjjAjj(x)·εj·s2(x) (8)
  • Step 5. Ui gets a legitimate user’s identity, v, in session j2 by observing Rjj where j>j2.

  • Step 6. Ui computes εj·s1(v) and εj·s2(v) through εj·s1(x) and εj·s2(x). Then, Ui pretends Uv to compute the session key Kj2 using εj·s1(v),εj·s2(v) and Mj2j(x),Nj2j(x) from the broadcast message Bj2.

Note that Ui is revoked in session j2, thus he should not have computed Kj2. Therefore the scheme cannot achieve the forward security. When the revoked user Ui obtains the session key Kj2, he can of course give this session key to a new user who joins the group after session j2 and should not know Kj2. Hence, the scheme can not resist the collusion attack. Similarly, the scheme does not have the mt-revocation capability.

3.2. Analysis of the Weakness

Chen et al. [2] proposed two one-way hash chain self-healing group key distribution schemes based on the revocation polynomial in their paper. In fact, in the first scheme, each kjj is masked by different masking polynomials, {εj·sj(x)|j=j,j+1,,m}, which makes the scheme to be more secure. However, Chen et al. claimed that using multiple masking polynomials does not contribute to the security. Based on this consideration, they presented the second scheme only using one masking polynomial for each kjj to reduce the number of masking polynomials and the personal secret stored by each user. Thus the second scheme achieves the optimal storage overhead.

Now let us check the attack again. From the above attack, it is easy to find that only using one masking polynomial to construct the personal secret directly makes the Equation (6) (in step 4) hold, where εj·s1(x) disappears when Equation (4) minus Equation (5). Furthermore, εj·s2(x) can be computed by the revoked user Ui through the Equation (7), which leads to the exposure of those users’ personal secret who join the group in session j, and finally results in the exposure of the session keys which should be kept secret from Ui.

Chen et al. [2] list Theorem 5 to show the security of their Scheme 2, thus Theorem 5 does not hold. To sum up, multiple masking polynomials should be adopted to design a secure self-healing group key distribution schemes using the polynomial secret sharing as the basic cryptographic technique. Unfortunately, multiple masking polynomials brings in the linear storage overhead. How to design a secure self-healing group key distribution schemes with constant storage overhead based on the polynomial secret sharing technique is still an open problem.

4. Conclusions

Chen et al. claimed that their self-healing group key distribution Scheme 2 achieves all basic security properties. Unfortunately, we found that Chen et al.’s Scheme 2 is insecure. Some security flaws are pointed out in this paper, i.e., the Scheme 2 can not hold the forward security, mt-revocation capability and mt-wise collusion attack resistance capability.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (No. 61300172, 61170295), High Technology Research and Development Program of China (No. 2015AA016004), the Fund of the State Key Laboratory of Software Development Environment (No. SKLSDE-2014ZX-14), and the Fundamental Research Funds for the Central Universities No. YWF-15-SYS-JSJXY-004).

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Staddon J., Miner S., Franklin M., Balfanz D., Malkin M., Dean D. Self-healing key distribution with revocation; Proceedings of the 2002 IEEE Symposium on Security and Privacy; Oakland, CA, USA. 12–15 May 2002; pp. 241–257. [Google Scholar]
  • 2.Chen H., Xie L., Wang Q. Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks. Sensors. 2014;14:24358–24380. doi: 10.3390/s141224358. [DOI] [PMC free article] [PubMed] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES