Blom's Scheme - Attack Resistance

Attack Resistance

In order to ensure at least k keys must be compromised before every shared key can be computed by an attacker, identifiers must be k-linearly independent: all sets of k randomly selected user identifiers must be linearly independent. Otherwise, a group of malicious users can compute the key of any other member whose identifier is linearly dependent to theirs. To ensure this property, the identifiers shall be preferably chosen from a MDS-Code matrix (maximum distance separable error correction code matrix). The rows of the MDS-Matrix would be the identifiers of the users. A MDS-Code matrix can be chosen in practice using the code-matrix of the Reed–Solomon error correction code (this error correction code requires only easily understandable mathematics and can be computed extremely quickly).

Read more about this topic:  Blom's Scheme

Famous quotes containing the words attack and/or resistance:

    Adolescents swing from euphoric self-confidence and a kind of narcissistic strength in which they feel invulnerable and even immortal, to despair, self-emptiness, self-deprecation. At the same time they seem to see an emerging self that is unique and wonderful, they suffer an intense envy which tears narcissism into shreds, and makes other people’s qualities hit them like an attack of lasers.
    Terri Apter (20th century)

    War is pillage versus resistance and if illusions of magnitude could be transmuted into ideals of magnanimity, peace might be realized.
    Marianne Moore (1887–1972)