| Literature DB >> 35009873 |
Shimaa A Abdel Hakeem1,2, HyungWon Kim1.
Abstract
Many group key management protocols have been proposed to manage key generation and distribution of vehicular communication. However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pairing cryptography. Many shared secret protocols have been proposed using polynomial evaluation and interpolation to solve the previous complexity issues. This paper proposes an efficient centralized threshold shared secret protocol based on the Shamir secret sharing technique and supporting key authentication using Hashed Message Authentication Code Protocol (HMAC). The proposed protocol allows the group manager to generate a master secret key for a group of n vehicles and split this key into secret shares; each share is distributed securely to every group member. t-of-n vehicles must recombine their secret shares and recover the original secret key. The acceptance of the recovered key is based on the correctness of the received HMAC signature to verify the group manager's identity and ensure the key confidentiality. The proposed protocol is unconditionally secure and unbreakable using infinite computing power as t, or more than t secret shares are required to reconstruct the key. In contrast, attackers with t-1 secret shares cannot leak any information about the original secret key. Moreover, the proposed protocol reduces the computation cost due to using polynomial evaluation to generate the secret key and interpolation to recover the secret key, which is very simple and lightweight compared with the discrete logarithm computation cost in previous protocols. In addition, utilizing a trusted group manager that broadcasts some public information is important for the registered vehicles to reconstruct the key and eliminate secure channels between vehicles. The proposed protocol reduces the communication cost in terms of transmitted messages between vehicles from 2(t-1) messages in previous shared secret protocols to zero messages. Moreover, it reduces the received messages at vehicles from 2t to two messages. At the same time, it allows vehicles to store only a single secret share compared with other shared secret protocols that require storage of t secret shares. The proposed protocol security level outperforms the other shared secret protocols security, as it supports key authentication and confidentiality using HMAC that prevents attackers from compromising or faking the key.Entities:
Keywords: HMAC authentication; Shamir secret; centralized protocols; key generation; key reconstruction; threshold protocols; unconditional secure; vehicular communication
Mesh:
Year: 2022 PMID: 35009873 PMCID: PMC8749701 DOI: 10.3390/s22010331
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
The proposed protocol contributions over the basic Shamir secret protocol.
| Security Properties | Basic Shamir Secret Sharing Issues | The Proposed Protocol Contributions |
|---|---|---|
| Misleading members |
Assume all members of the group are honest. Individual members can mislead or ignore other participants’ contributions. |
This assumption cannot be held in an untrustworthy and decentralized network. Members are not involved in the key reconstruction. |
| Decentralizing |
Group members must communicate to exchange their secret parts required for key recovery. Require |
Support centralized implantation where the base stations work as trusted group managers for vehicles. No need for the existence of t participants. The group manager broadcast |
| High dynamic networks |
It is impractical in V2X communication with high dynamic nature as many vehicles can join or leave the group frequently. At least |
Adding or removing group members does not affect the generated secret shares and the original key reconstruction. The group manager provides any required shares to reconstruct the key. |
| High communication overhead |
Substantial overhead owing to high communication among participants. |
No need for communication between participants to share their secret parts. Vehicles depend on the received information from the group manager. |
| Requirement of a secure channel |
The communications between group members require secure channels. |
No need for secure channels between participants. We are reducing the overhead of establishing secure channels between vehicles. |
| Key recovery attacks |
Vulnerable to key recovery attacks since each participant’s secret part is broadcasted in a broadcast channel. |
Resistance to key recovery attacks by reducing the communication between vehicles at the initialization phase. |
| The misbehaving dealer |
If the dealer is a bad actor, the private key can be stolen or abused. |
The dealer in the proposed protocol is trusted and authenticates itself via HMAC authentication protocol. |
| The key authentication and confidentiality |
It’s a security issue since the private key must first be produced and divided into parts. |
The proposed protocol supports the key authentication using HMAC signatures. |
| Verification of secret shares |
Requires the verification of secret shares to ensure the correctness of shared secret parts. |
Only authorized and registered vehicles can join the network. No need for secret shares verification process. Vehicles are not required to broadcast their secret parts to other vehicles. |
Comparison of the previous shared secret protocols in terms of advantages and disadvantages.
| Shared Secret Protocol | Advantages | Disadvantages | Implementation Type |
|---|---|---|---|
| Basic Shamir [ |
No verification of secret shares. Unconditionally secure. ( |
Require secure channel. Require group members’ communication. High communication cost. No key updating and authentication. | Decentralized |
| Ulutas et al. [ |
Secure distribution of shares of medical images. No verification of secret shares. ( |
No key updating. No key authentication. Dishonest and fake shares distribution. | Decentralized |
| Harn et al. [ |
Support a verifiable secret sharing method based on the CRT. Using Asmuth–Bloom’s scheme. It does not require a secure channel. |
Require verification of secret shares. High communication cost. Computationally secure. No key updating and key authentication. | Centralized |
| Liu et al. [ |
Efficient secret share using Asmuth–Bloom’s scheme. Unconditionally secure. |
Require verification of secret shares. No key updating and no key authentication. Require secure channel. | Centralized |
| Liu et al. [ |
Unconditionally secure. Using Chinese Reminder Theorem, Shamir’s Secret Sharing, and Asmuth-secret Bloom’s sharing. Support key authentication using a one-way hash function. |
Require verification of secret shares. Require secure channel. No key updating. High communication cost. | Centralized |
| Meng et al. [ |
Presented two thresholds changeable secret sharing methods. Using a mix of bivariate and univariate polynomials. Unconditionally secure. |
Require secure channel. Require verification of secret shares. No key updating and authentication. | Centralized |
| Liu et al. [ |
A linear threshold secret sharing that combines two of Shamir’s procedures. Cheating detection. No verification of secret shares. |
No key updating and key authentication. High communication cost due to using of two polynomials. | Centralized |
Figure 1The threshold Shamir secret sharing key generation and reconstruction.
Figure 2The proposed network system model.
Figure 3The proposed key generation and distribution process.
Figure 4The proposed key authentication process using HMAC.
Figure 5The proposed key reconstruction message structure.
Figure 6The proposed key reconstruction process.
Figure 7The graphical representation of the generated secret shares over a finite field .
The generated secret shares by the trusted G.M over the polynomial .
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | … |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 19 | 20 | 15 | 4 | 10 | 10 | 4 | 15 | 20 | 19 | … |
Security features comparison for the proposed key management protocol and other shared secret related works.
| Security Features | Shamir Secret [ | Ulutas et al. | Harn et al. | Liu et al. | Liu et al. [ | Meng et al. [ | Liu et al. | The Proposed |
|---|---|---|---|---|---|---|---|---|
| Authentication using HMAC | No | No | No | No | No | No | No | Yes |
| Key updating | No | No | No | No | No | No | No | Yes |
| Verification of secret shares | No | No | Yes | Yes | Yes | Yes | No | No |
| Secure channel requirement | Yes | Yes | No | Yes | Yes | Yes | Yes | No |
| Centralized implementation | No | No | Yes | Yes | Yes | Yes | Yes | Yes |
| Based Shamir Secret Share | Yes | Yes | No | No | Yes | No | Yes | Yes |
| Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | |
| Group member broadcasting | Yes | Yes | Yes | Yes | No | Yes | Yes | No |
| Unconditionally secure | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes |
The computation cost of shares generation for the proposed protocol and some linear shared secret protocols.
| The Shared Secret Protocols | Modular Arithmetic Operations over a Finite Field | ||
|---|---|---|---|
| Modular Multiplication | Modular Addition | Modular Multiplicative Inverse | |
| Shamir Secret [ |
|
| - |
| Liu et al. [ |
|
| - |
| The proposed |
|
| - |
The computation cost of share reconstruction for the proposed protocol and some linear shared secret protocols.
| The Shared Secret Protocols | Modular Arithmetic Operations over a Finite Field | ||
|---|---|---|---|
| Modular Multiplication | Modular Addition | Modular Multiplicative Inverse | |
| Shamir Secret [ |
|
|
|
| Liu et al. [ |
|
|
|
| The proposed |
|
|
|
The communication cost for the proposed protocol and some other related shared secret protocols.
| The Shared Secret Protocols | Sent Messages from G.M | Sent Messages from Participants Vehicles | Received Messages at Participants Vehicles |
|---|---|---|---|
| Shamir Secret [ |
|
|
|
| Liu et al. [ |
|
|
|
| The proposed |
| - | 2 |
Note: represents the required secret shares to recover the key.
Figure 8The transmitted messages per each participant vehicle during the key reconstruction phase.
Figure 9The received messages per participant vehicle during the key reconstruction phase.
Figure 10The total transmitted messages from the group manager during the key generation and reconstruction phases.