Research Article

Self-Healing Group Key Distribution Facilitating Source Authentication Using Block Codes

Table 2

Comparison of the functionalities of the related schemes.

SchemeNo. of revoked usersAuthorized groupRevoked users rejoining a later sessionSource authenticationSelf-healingOther key features

[12, 13]Predetermined before deploymentNot flexibleNot allowedNot providedYesUS
[14]Predetermined before deploymentNot flexibleNot allowedNot providedYesUS
[3, 19]Predetermined before deploymentNot flexibleNot allowedNot providedYesCS
[39]Predetermined before deploymentNot flexibleYes but with different identityNot providedYesCS
[27]Not predeterminedFlexibleAllowedNot providedYesCS; GKUPMC
[29]Not predeterminedFlexibleAllowedNot required1Not considerHKS; GKUMCSC.
[30]Not predetermined but the number of group members is predeterminedFlexibleAllowedNot providedNot considerPDGKM; GKUMC; the size of the encryption expands linearly with the number of the members
[32]Not predeterminedFlexibleAllowedNot providedMutual healing2GKUMC
[31]Not predeterminedFlexibleAllowedNot providedNot considerGKUMC
[26]Not predeterminedFlexibleAllowedNot providedYesGKUMC
[21]PredeterminedNot flexibleNot allowedNot providedYesGKUMC
[22]PredeterminedNot flexibleNot allowedNot providedYesGKUPMC
OursNot predeterminedFlexibleAllowedProvidedYesGKUPMC

In a pay-TV system, there is only one message source. A node can recover the lost keys from the ground station and the neighbors. CS: computationally secure; US: unconditionally secure. GKUMC: Group Key Updating triggered by Membership Change; GKUPMC: Group Key Updating Periodically and triggered by Membership Change; GKUMCSC: Group Key Updating triggered by Membership Change and Subscription Change; HKS: Hierarchical Key Structure; PDGKM: Partially Distributed Group Key Management.