Research Article

Self-Healing Group Key Distribution Facilitating Source Authentication Using Block Codes

Table 1

The notations.

The set of users

; , the set of authorized users in session j; denotes the number of users in
M, , and Generator matrix for block codes, where n denotes the block length and k denotes the information length; denotes the generator matrix for session j, which is a submatrix of
; : secret key of user ; : group key for session j; : a random nonce
Secure keyed one-way hash functions : , where , respectively, denotes the bit length of /random nonce; one-way hash function:
The seed value for user hash chains at session j
, where denotes applying s times; s is the maximum number of encryptions each member can send in each session
d = Information symbols
 = =()Information symbols for session j; it consists of the group key and the authentication tokens for the participants; s denotes the maximum number of messages in session j
; Parity symbols
T = Successive time epochs
ADAdversaries
The set of authentication tokens for session j; could be used to authenticate the message sources in session j
BCjBCj = {,}: the broadcast data BCj could be used to derive and
MAC()Message authentication code function MAC(): ; it could be implemented, using HMAC [36]
ENC/Encryption/encryption using the key k