期刊文献+

Multi-Seed Key Distribution Scheme Test

Multi-Seed Key Distribution Scheme Test
下载PDF
导出
摘要 The key problem of securing multieast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed (MPE) scheme is an approach which is based on Polynomial expansion (PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number (SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper. The key problem of securing multieast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed (MPE) scheme is an approach which is based on Polynomial expansion (PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number (SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1243-1248,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60473072)
关键词 polynomial expansion with multi-seed(MPE) multi seed one way function strict prime number(SPN) polynomial expansion with multi-seed(MPE) multi seed one way function strict prime number(SPN)
  • 相关文献

参考文献12

  • 1徐明伟,董晓虎,徐恪.组播密钥管理的研究进展[J].软件学报,2004,15(1):141-150. 被引量:66
  • 2朱文涛,熊继平,李津生,洪佩琳.安全组播中密钥分配问题的研究[J].软件学报,2003,14(12):2052-2059. 被引量:18
  • 3Rafael C Gonzalez,Richard E Woods,Steven L Eddins.Digital Image Processing Using Matlab[]..2004
  • 4Wang Ying.A Fast Way to Find a Big Prime Number in RSA Scheme[].Journal of Hunan University of Science and Engineering.2005
  • 5Xie Yumin,,Shi Feng,Muhammad Kamran.Implement MPE Scheme with Strict Prime Number [ J][].WSEAS Trasaction on Computers.2005
  • 6Network Working Group.Group Key Management Protocol Specification. [. . http: // www. cnpaf.net/Class/Rfcen/0532918535388516. html . 2006
  • 7Setiner H,,Taudik G,Waidnet M.Cliques: A New Approach to Group Key Agreement[].Technical Report RZ IBM Research.1997
  • 8Chiou G,,Chen W.Secure Broadcasting Using the Secure Lock [ J ][].IEEE Transactions on Software Engineering.1989
  • 9Poovendran R,,John S,Baras.An Information-Theoretic Approach for Design and Analysis of Rooted-Tree-Based Multicast Key Management Schemes [ J][].IEEE Trasactions on sInformation Theory.2001
  • 10Wong C,,Gouda M,Lam S.Secure Group Communications Using Key Graphs [ J][].ACM Trans Networking.2000

二级参考文献32

  • 1[1]Deering S. Host extensions for IP multicasting. IETF RFC1112, 1989.
  • 2[2]Quinn B, Almeroth K. IP multicast applications: Challenges and solutions. IETF RFC 3170, 2001.
  • 3[3]Fenner W. Internet group management protocol, version 2. IETF RFC2236, 1997.
  • 4[4]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol, version 3. IETF RFC3376, 2002.
  • 5[5]Krusus PS, Macker JP. Techniques and issues in multicast security. In: Proceedings of the Military Communications Conference. Boston, 1998. 1028~1032.
  • 6[6]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, 2000.
  • 7[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. In: Proceedings of the IEEE INFOCOM 2001. Anchorage, 2001. 422~431.
  • 8[8]Tanaka S, Sato F. A key distribution and rekeying framework with totally ordered multicast protocols. In: Proceedings of the 15th International Conference on Information Networking. Beppu City, 2001. 831~838.
  • 9[9]Li M, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint. IEEE Communications Letters, 2000,6(3):108~110.
  • 10[10]Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2001,47(7):2824~2834.

共引文献77

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部