Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A Key Distribution System Based on Hadamard Designs

A Key Distribution System Based on Hadamard Designs —The topical problem of the key distribution in a community for providing secure communication among its participants is studied. To solve this problem, key predistribution systems can be considered, where each user receives some key information they can later use to calculate independently from the system’s other participants required shared secret keys for conferences they participate in. These key distribution systems can be based on different structures, such as error-correcting codes and combinatorial designs. The weakness of such systems is the risk of collusive attacks, when abusers within the system can form a coalition and use their key information to try and calculate shared secret keys of other users. But the system guarantees the secrecy of keys provided that the number of abusers in the coalition does not exceed a threshold defined by the system structure. In this paper, we consider a key distribution system that is based on combinatorial designs, in particular, on Hadamard 3‑designs, and guarantees the secrecy of communication in case of coalitions of less than three users. New notions of combinatorial span and combinatorial rank of a subset of Hadamard code are introduced that are required for studying the system’s resilience to collusive attacks. In addition, some combinatorial properties of Hadamard codes are analyzed. The probability of a successful collusive attack against an arbitrary conference is calculated for the constructed key distribution system, depending on the capacity of the coalition of abusers. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Automatic Control and Computer Sciences Springer Journals

A Key Distribution System Based on Hadamard Designs

Loading next page...
 
/lp/springer-journals/a-key-distribution-system-based-on-hadamard-designs-BMm0QoKxwV
Publisher
Springer Journals
Copyright
Copyright © Allerton Press, Inc. 2020. ISSN 0146-4116, Automatic Control and Computer Sciences, 2020, Vol. 54, No. 7, pp. 584–593. © Allerton Press, Inc., 2020. Russian Text © The Author(s), 2019, published in Modelirovanie i Analiz Informatsionnykh Sistem, 2019, No. 2, pp. 229–243.
ISSN
0146-4116
eISSN
1558-108X
DOI
10.3103/S0146411620070068
Publisher site
See Article on Publisher Site

Abstract

—The topical problem of the key distribution in a community for providing secure communication among its participants is studied. To solve this problem, key predistribution systems can be considered, where each user receives some key information they can later use to calculate independently from the system’s other participants required shared secret keys for conferences they participate in. These key distribution systems can be based on different structures, such as error-correcting codes and combinatorial designs. The weakness of such systems is the risk of collusive attacks, when abusers within the system can form a coalition and use their key information to try and calculate shared secret keys of other users. But the system guarantees the secrecy of keys provided that the number of abusers in the coalition does not exceed a threshold defined by the system structure. In this paper, we consider a key distribution system that is based on combinatorial designs, in particular, on Hadamard 3‑designs, and guarantees the secrecy of communication in case of coalitions of less than three users. New notions of combinatorial span and combinatorial rank of a subset of Hadamard code are introduced that are required for studying the system’s resilience to collusive attacks. In addition, some combinatorial properties of Hadamard codes are analyzed. The probability of a successful collusive attack against an arbitrary conference is calculated for the constructed key distribution system, depending on the capacity of the coalition of abusers.

Journal

Automatic Control and Computer SciencesSpringer Journals

Published: Feb 8, 2021

There are no references for this article.