期刊文献+

组密钥管理中的d叉树数据结构设计 被引量:2

Design of d-ary Tree Structures for Group Key Management
下载PDF
导出
摘要 d叉树数据结构与算法在互联网多播安全的层次化组密钥管理的实现中是极其重要的。我们设计了适用于层次化组密钥管理的d叉树数据结构表示与算法,并给出了相应的存储结构中随机定位所需要的数学性质。 The d-ary tree structures are paramount in the implementation of hierarchical group key management for the Internet multicasting security. In this paper, we describe the d-ary tree structure representation and algorithms, and present the mathematical properties for the random location in the corresponding memory structures.
作者 陆正福 何英
出处 《计算机工程与科学》 CSCD 2006年第10期13-15,共3页 Computer Engineering & Science
基金 云南省自然科学基金资助项目(2002F0012M) 云南大学理工科校级科研重点项目(2003Z010C)
关键词 多播安全 组密钥 d叉树 算法设计 密钥图 密钥树 multicasting security group key d-ary tree algorithm design key graph key tree
  • 相关文献

参考文献6

二级参考文献31

  • 1[3]JUDGE P,AMMAR M.WHIM:Water-marking multicast video with a hierarchy of inter-mediaries[J].Computer Networks:The International Journal of Computer and Telecommunications Networking,2002,39(6):699-712.
  • 2[4]BROWN I,PERKINS C,CROWCROFT J.Watercasting:distributed watermarking of multicast media[A].Proceedings of the First International Workshop on Networked Group Communication[C].Berlin:Springer-Verlag,1999.286-300.
  • 3[5]CHU Hao-hua,QIAO Lin-tian,NAHRSTEDT K.A secure multicast protocol with copyright protection[A].Proceedings of the IS&T/SPIE Conference on Security and Watermarking of Multicast Contents[C].Calif San Jose Jan,1999.460-471.
  • 4[6]PARVIAINEN R,PARNES P.Large scale distributed watermarking of multicast media through encryption.Communications and Multimedia Security[EB/OL].http://citeseer.nj.nec.com/447585.html,2003-09-20.
  • 5[7]MITCHELL D S,AHMED H T.Multimedia data-embedding and watermarking technologies[J].Proceedings of the IEEE,1998,86(6):1064-1087.
  • 6[8]WAGNER N R.Fingerprinting.Symposium on Security and Privacy,IEEE[EB/OL].http://citeseer.nj.nec.com/447585.html,2003-09-20.
  • 7[9]BONEH D,SHAW J.Collusion-secure finger-printing for digital data[A].Crypto'95,LNCS 963[C].Berlin:Springer-Verlag,1995.452-465.
  • 8[11]FRITZ H.Time-limited blackbox security:protecting mobile agents from malicious Hosts[A].Mobile Agent Security,LNCS,1419[C].Berlin:Springer-Verlag,1996.92-113.
  • 9Harney H, Muckenhim C. Group Key Management Protocol (GKMP)Architecture[S]. RFC 2094, 1997.
  • 10Ballardie A. Scalable Multicast Key Distribution[S]. RFC 1949,1996.

共引文献18

同被引文献7

  • 1陆正福,李亚东,何英.IP多播组密钥管理方案分类体系研究[J].计算机工程与科学,2004,26(10):23-26. 被引量:13
  • 2KIM Y, PERRIG A, TSUDIK G. Tree-based Group Key Agreement [ C ]//ACM Transaction on Information and System Security. New York : ACM Press ,2004:60-96.
  • 3PERERIA O, QUISQUATER J. Some Attacks thenticated Group Key Agreement Protocols [ J ] of Computer Security, 2003, 11 (04) :555-580.
  • 4CANETI'I R. Universally Composable Security: Paradigm for Cryptographic Protocols [ EB/OL ]. eprint, iacr. org/2000/067, pdf on Au- Journal A New http ://.
  • 5CANEI33 R. On Universally Composable Notions of Se- curity for Signature, Certification and Authentication [ M ]. New York : ACM Press, 2003.
  • 6贾洪勇,卿斯汉,谷利泽,杨义先.通用可组合的组密钥交换协议[J].电子与信息学报,2009,31(7):1571-1575. 被引量:8
  • 7陈廷威,高博.一种基于服务器端的群组密钥协商方案[J].通信技术,2010,43(3):162-164. 被引量:3

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部