期刊文献+

安全群组通信系统中的密钥分配机制 被引量:2

A new group key assignment scheme for secure group communication
下载PDF
导出
摘要 提出了一种基于B-树结构的新的组密钥分配方案(BKA),包括集中式分配协议(C-BKA)和分布式分配协议(D-BKA).该方案提供了密钥独立性,能够确保密钥分配的前向、后向安全性,并且能够抵抗联合攻击.集中式方案虽然不可避免地存在单失效点,但协议的计算量和通信量都较小,能够高效地处理成员的加入与退出,扩展性好,适用于任意大小的群组.分布式方案与集中式相比计算量虽有所上升,但具有密钥产生公平性,不会形成单失效点,通信量亦较小,同样能够很好地适应群组的动态变化,扩展性好,对中小规模分布安全组通信系统尤其适用. The paper presents a B-tree-based group key assignment scheme,which includes a centralized protocol and a distributed one.Security analyses show that this scheme provides key independency and meets the forward and backward secrecy requirements when a new member leaves or joins a group.The scheme is also secure against collusive attack.Though there is a single failure point in the centralized protocol,the protocol has advantage in computation and communication.It can deal with the dynamic changes in the group efficiently,and has good scalability.Also it can be easily deployed in any size secure group communication systems.Compared to the centralized protocol,the distributed needs more computation,but there is no single failure point and the generation of the group key is fair.The distributed protocol also has advantage in communication,can deal with the dynamic changes efficiently,and has good scalability.It is particularly suitable for the small or medium size groups.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第z1期21-24,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 中国下一代互联网示范工程资助项目(CNGI-04-15-7A) 基于IPV6的大学课程在线应用网格计划资助项目
关键词 安全群组通信 群密钥分配 密钥分配树 安全分配协议 secure group communication group key assignment key assignment tree secure assignment protocol
  • 相关文献

参考文献7

  • 1[1]Le V,Guyennet H.IPSec and DNSSEC to support grid application security[C]∥Rana O.Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).Berlin:IEEE Computer Society Press,2002:458-459.
  • 2[2]Rafaeli S,Hutchison D.A survey of key management for secure group communication[J].ACM Computing Surveys,2003,35(3):309-329.
  • 3[3]Stein M,Tsudik G,Waidner M.Key agreement in dynamic peer groups[J].IEEE Trans on Parallel and Distributed Systems,2000,11(8):769-780.
  • 4[4]Caronni G,Waldvogel M,Sun D.Efficient security for large and dynamic groups[C]∥Stanford.Proc the 7th Workshop on Enabling Technologies(WET ICE'98).Washington:IEEE Computer Society Press,1998:376-383.
  • 5[5]Dinsmore P T,Balenson D M,Heyman M.Policy-based security management for large dynamic groups:an overview of the DCCM project[C]∥Hilton H.Proc the DARPA Information Survivability Conference & Exposition.Washington:IEEE Computer Society Press,2000:64-73.
  • 6[6]Mcgrew D A,Sherman A T.Key establishment in large dynamic groups using one-way function trees[J].IEEE Trans on Software Engineering,2003,29(5):444-458.
  • 7李先贤,怀进鹏,刘旭东.群密钥分配的动态安全性及其方案[J].计算机学报,2002,25(4):337-345. 被引量:26

二级参考文献13

  • 1[1]Ateniese G, Chevassut D, Hasse D et al. The design of a group key agreement API. In: Proc DARPA Information Survivability Conference and Exposition, SC, USA, 2000. 115-126
  • 2[2]Caronni G, Waldvogel M, Sun D et al. Efficient security for large and dynamic groups. In: Proc the 7th Workshop on Enabling Technologies, (WET ICE'98), Stanford, California, USA,1998. 376-383. http://www.computer.org/ proceedings/wetice/8751/8751toc.htm
  • 3[3]Lakshminath R, Mukherjee S, Sama A. A dual encryption protocol for scalable secure multicasting. In: Proc the 4th IEEE Symposium on Computers and Communications, Red Sea, Egypt, 1999. 2-8
  • 4[4]Gong L, Shacham N. Elements of trusted multicasting. In: Proc IEEE International Conference on Network Protocols, Boston, MA, USA, 1994. 23-30
  • 5[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) Architecture. RFC 2094, 1997
  • 6[6]Blundo C, Santis A D, Herzberg A et al. Perfectly-secure key distribution for dynamic conferences. In: Proc CRYPTO'92, California, USA, 1992. 471-486
  • 7[7]Mayer A, Yung M. Generalized secret sharing and group-key distribution using short keys. In: Proc Compression and Complexity of Sequences 1997, Salerno, Italy, 1998. 30-44
  • 8[8]Chiou G H, Chen W T. Secure broadcasting using the secure lock. IEEE Trans Software Engineering, 1989,15(8): 929-934
  • 9[9]Ballardie T. Scalable Multicast Key Distribution. RFC 1949, 1996
  • 10[10]Dinsmore P T, Balenson D M, Heyman M et al. Policy-based security management for large dynamic groups: An overview of the DCCM project. In: Proc the DARPA Information Survivability Conference & Exposition, SC, USA, 2000. 64-73

共引文献25

同被引文献6

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部