期刊文献+

一种新的组密钥管理方案

A New Group Key Management Scheme
下载PDF
导出
摘要 给出了一种新的组密钥管理方案,该方案是基于密钥树、异或运算以及单向函数链,能保证前向以及后向安全性:新加入的组成员不能获得以前的组播报文,而且即使任意多个退出组播组的组成员进行合谋也不能获得以后的组播报文。就通信、计算以及存储开销而言,该方案比现有其他基于密钥树的方案有所提高。 This paper presents a new group key management scheme, which is based on keys tree, xor operations and one-way function chains. It provides backward and forward security; Newly admitted group members cannot read previous messages and evicted members cannot read future messages, even with collusion by arbitrarily many evicted members. As far as transmission, computation and storage costs are concerned, the new scheme presented in this paper is better than other existing schemes, which are based on keys tree.
出处 《计算机工程》 CAS CSCD 北大核心 2006年第11期7-9,46,共4页 Computer Engineering
关键词 安全组播通信 组密钥管理 密钥树 Secure group communication Group key management Keys tree
  • 相关文献

参考文献7

  • 1Stein M, Tsudik G, Waidner M. Key Agreement in Dynamic Peer Groups[J]. IEEE Trans. on Parallel and Distributed Systems, 2000,11(8): 769-780.
  • 2Harney H, Muckenhirn C, Rivers T. Group Key Management Protocol(GKMP) Specification[S]. RFC2093,1997.
  • 3Harney H, Muckenhirn C, Rivers T. Group Key Management Protocol(GKMP) Architecture[S]. RFC2094,1997
  • 4Harney H, Harder E. Logical Key Hierarchy Protocol[Z]. IETF,1999-03.
  • 5Alan T, Sherman D A. Key Establishment in Large Dynamic Groups Using One-way Function Trees[J]. IEEE Transactions on Software Engineering, 2003, 28(5): 444-458.
  • 6朱文涛,熊继平,李津生,洪佩琳.安全组播中密钥分配问题的研究[J].软件学报,2003,14(12):2052-2059. 被引量:18
  • 7Matthew J M, Josyula R R, Rohatgi E A Survey of Security Issues in Multicast Communications[J]. IEEE Network, 1999, 13(6): 12-23.

二级参考文献17

  • 1[1]Deering S. Host extensions for IP multicasting. IETF RFC1112, 1989.
  • 2[2]Quinn B, Almeroth K. IP multicast applications: Challenges and solutions. IETF RFC 3170, 2001.
  • 3[3]Fenner W. Internet group management protocol, version 2. IETF RFC2236, 1997.
  • 4[4]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol, version 3. IETF RFC3376, 2002.
  • 5[5]Krusus PS, Macker JP. Techniques and issues in multicast security. In: Proceedings of the Military Communications Conference. Boston, 1998. 1028~1032.
  • 6[6]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, 2000.
  • 7[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. In: Proceedings of the IEEE INFOCOM 2001. Anchorage, 2001. 422~431.
  • 8[8]Tanaka S, Sato F. A key distribution and rekeying framework with totally ordered multicast protocols. In: Proceedings of the 15th International Conference on Information Networking. Beppu City, 2001. 831~838.
  • 9[9]Li M, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint. IEEE Communications Letters, 2000,6(3):108~110.
  • 10[10]Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2001,47(7):2824~2834.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部