Self-Healing Group Key Distribution Facilitating Source Authentication Using Block Codes
Table 1
The notations.
The set of users
;
, the set of authorized users in session j; denotes the number of users in
M, , and
Generator matrix for block codes, where n denotes the block length and k denotes the information length; denotes the generator matrix for session j, which is a submatrix of
;
: secret key of user ;: group key for session j; : a random nonce
Secure keyed one-way hash functions :, where , respectively, denotes the bit length of /random nonce; one-way hash function:
The seed value for user hash chains at session j
, where denotes applying s times; s is the maximum number of encryptions each member can send in each session
d =
Information symbols
= =()
Information symbols for session j; it consists of the group key and the authentication tokens for the participants; s denotes the maximum number of messages in session j
;
Parity symbols
T =
Successive time epochs
AD
Adversaries
The set of authentication tokens for session j; could be used to authenticate the message sources in session j
BCj
BCj = {,}: the broadcast data BCj could be used to derive and
MAC()
Message authentication code function MAC(): ; it could be implemented, using HMAC [36]