期刊文献+

密钥覆盖问题的建模、变换及近似算法 被引量:1

On the Modeling Transformations and Approximation Algorithms of Key Covering Problem in the Group Rekeying
下载PDF
导出
摘要 组密钥管理是组安全、多播安全中的核心问题.本文给出了密钥覆盖问题模型的建立过程,首次给出密钥覆盖问题(KCP)与顶点覆盖问题(VCP)的相互变换.基于从VCP到KCP的变换,证明了密钥覆盖问题是NP完全的;基于从KCP到VCP的变换,基于VCP的算法为KCP设计了一类近似算法并给出了模拟试验.本文的结果为组安全、多播安全研究提供了更为坚实的算法基础. Group key management is essential for group security, especially for multieast security. This paper presents the modeling process of the key covering problem (KCP) in the group rekeying and the transformations between the KCP and the vertex covering problem(VCP) in the graph theory. Furthermore,based on the transformation from the VCP to the KCP,the NP- completeness of the decision version of the KCP is proved via the decision version of the VCP ;Based on the transformation from the KCP to the VCP,the approximation algorithms for the KCP is designed via the greedy approximation algorithms for the VCP and the simulation is also given. The results of this paper lay a more solid algorithmic foundation for the research of group security,especially of multieast security.
机构地区 云南大学数学系
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第7期1189-1194,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(10561009)资助 云南省自然科学基金项目(2002F0012M)资助 云南大学中青年骨干教师培养计划专项经费资助项目 云南大学理(工)科校级科研重点项目(2003Z010C)资助
关键词 组密钥管理 组合优化 计算复杂性 顶点覆盖问题 密钥覆盖问题 密钥图 group key management combinatorial optimization computational complexity vertex covering problem key covering problem key graph
  • 相关文献

参考文献11

  • 1Wallner D,Harder E R.Agee key management for multicast:issues and architectures[S].IETF.RFG 2627,June 1999.
  • 2Baugher M,Canetti R,Dondeti L,et al.MSEC group key management architecture[S].IETF.RFC 4046.April 2005.
  • 3Garey M R,Johnson D S.Computers and intractability:a guide to the theory of NP-completeness[M].New York:W.H.Freeman,1979.
  • 4Cormen T H,Leiserson C E,Rivest R L.Introduction to algorithms[M].Cambridge:MIT Press,1989.
  • 5Papadimitriou C H.Computational complexity[M].Boston:Addison Wesley,2004.
  • 6Sun Hui-quan.Graph theory and its application[M].Beijing:Science Press,2004
  • 7Wong C K,Gouda M,Lam S.Secure group communications using key graphs[C].In:Proceedings of ACM SIGCOMM'98,1998,28 (4):68-79.
  • 8Wong C K,Gouda M,Lam S.Secure group communications using key graphs[J].IEEE/ACM Trans on Networking,2000,8(1):16-30.
  • 9陆正福,李亚东,何英.IP多播组密钥管理方案分类体系研究[J].计算机工程与科学,2004,26(10):23-26. 被引量:13
  • 10Dorit S.Hochbaum approximation algorithms for NP-hard problems[M].Boston:PWS Publishing Company,1997.

二级参考文献22

  • 1Harney H, Muckenhim C. Group Key Management Protocol (GKMP)Architecture[S]. RFC 2094, 1997.
  • 2Ballardie A. Scalable Multicast Key Distribution[S]. RFC 1949,1996.
  • 3Mittra S. Iolus: A Framework for Scalable Secure Multicasting[ A].Proc of ACM SIGCOMM[C]. 1997. 277 - 288.
  • 4Hardjono T, Cain B, Doraswamy N. A Framework for Group Key Management for Multicast Security[R]. Internet Draft, 2000.
  • 5Hardjono T, Cain B, Monga I. Intra-Domain Group Key Management Protocol[R]. Internet Draft, 2000.
  • 6Dondeti L, Mukherjee S, Samal A. Scalable Secure One-to-Many Group Communication Using Dual Encryption[J]. Computer Communications, 2000, 23: 1681-1701.
  • 7Steiner M, Tsudik G , Waidner M. Diffie-Hellman Key Distribution Extended to Group Communication[ A]. 3rd ACM Conf on Computer and Communications Security, ACM SIGSAC [ C ]. 1996.31 - 37.
  • 8Becker C, Wille U. Communication Complexity of Group Key Distribution [A]. 5th ACM Conf on Computer and Communications Security[C]. 1998.
  • 9Wallner D, Harder E, Agee R. Key Management for Multicast:Issues and Architectures[S]. RFC 2627, 1999.
  • 10Balenson D, McGrew D, Sherman A. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization[R]. Internet Draft, 2000.

共引文献12

同被引文献16

  • 1陆正福,李亚东,何英.IP多播组密钥管理方案分类体系研究[J].计算机工程与科学,2004,26(10):23-26. 被引量:13
  • 2韩秀玲,王行愚.大型动态多播群组的分布式密钥管理方案[J].小型微型计算机系统,2004,25(12):2199-2202. 被引量:6
  • 3陆正福,洪孙焱.密钥覆盖问题的NP完全性证明[J].云南大学学报(自然科学版),2006,28(3):201-205. 被引量:1
  • 4GENNARO R, ISHAI Y, KUSHILEVITA E, et al. The round complexity of verifiable secret sharing and secure muhicast [ C ]. Proc. 33 rd ACM symposium on Theory of computing(STOC) ,2001,580-589.
  • 5KATZ J, KOO C Y. Round - efficient secure computation in point - to - point networks [ C ]. Advances in Cryptology - Euro- crypt, 2007,311-328.
  • 6BEAVER D, MICALI S, ROGAWAY P. The round complexity of secure protocols [C ]. Proc 22nd ACM Symposium on the Theory of Computing( STOC), 1990,503-513.
  • 7FITZI M, GARAY J. Round - optimal and efficient verifiable secret sharing [ C ]. 3rd Theory of Cryptography Conference ( TCC ), 2006,329 -342.
  • 8KATZ J, KOO C Y. Improving the round complexity of VSS in point - to - point networks [ J ]. Information and Computation, 2008,207 ( 8 ) : 889 -899.
  • 9HUANG J H, MISHRA S. Mykil:A highly scalable key distribution protocol for large group muhicast[ C ]. Global Telecommunications Conference, GLOBECOM' 03. IEEE ,2003,3 (3) : 1 476-1 480.
  • 10SAROIT I A, E1 -ZOGHDY S F, MATAR M. A scalable and distributed security protocol for multicast communications [ J ]. Internation Journal of Network Security,2011,12 (2) :61-74.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部