期刊文献+

动态分布式层次密钥管理

Dynamic Distributed Key Management in a Hierarchy
下载PDF
导出
摘要 层次秘密通信在电子商务与电子政务以及其他的具有层次结构的系统中有广泛的应用,本文通过利用单向散列函数的不可逆计算的特性,设计了一个单向的等级加密体制的密钥管理方案,上级组结点可以安全容易的获取下级组结点的密钥,反之不然.并且在方案中实现安全组的动态添加、删除及更新组结点密钥.本方案计算量小、存贮要求低,并且可以实现分布式并行化计算. Secure secret communication in a hierarchy is widely used in e-commerce, e-government affairs or other systems which have a hierarchy structure. A one-way key management scheme for an encryption system in a hierarchy based on the one-way hash function is proposed in this paper, in which one group can obtain the key of its subordinate group securely and easily, but the opposite is not allowed. It is easy to add or delete a security group, and is easy to change the key of a security group. This scheme has the characteristics of needing low computation and low storage, being high distributed and having parallel computing.
作者 贺忠华 农正
出处 《广西师范学院学报(自然科学版)》 2006年第4期93-96,共4页 Journal of Guangxi Teachers Education University(Natural Science Edition)
关键词 密钥管理 单向散列函数 等级 key management, one- way hash function, hierarchy
  • 相关文献

参考文献8

  • 1S G AKI, P D Taylor: Cryptographic solution to a problem of access control in a hierarchy[J].ACM TRANS. ComputerSystems, 1983,1(3): 239-248.
  • 2C H. Lin. Dynamic key management schemes for access control in a hierarchy[J]. Computer Communications, 1997, 29:1381-1385.
  • 3L ee, N arn2yih, Hwang, Tzonelih. Comments on'dynamic key management schemes for access contro t in a hierarchy' [J].Computer Communications, 1997, 22 (5) : 1381-1385.
  • 4蒙杨,卿斯汉,刘克龙.等级加密体制中的密钥管理研究[J].软件学报,2001,12(8):1147-1153. 被引量:5
  • 5Voctor r. 1. Shen , Tzer-Shyong Chen. a novel key management scheme based on discrete logarithms and polynomial in-terpolations[J]. Computer & security, 2002,21(2): 164-171.
  • 6Tzer-ShyongChen,Yu-FangChung.An Efficient Key Assignment Scheme Based on One—Way Hash Function in a User Hierarchy[J].Journal of Computer Science & Technology,2003,18(2):210-213. 被引量:3
  • 7Tzer- Shyong Chen , Yu - Fang Chung. A novel key management scheme for dynamic access control in a user hierarchy[J]. Applied Mathemation and Computation, 2005,162: 339-351.
  • 8Cungang Yang , Celia Li. Access control in a hierarchy using one-way hash functions[J]. Computer Security, 2004 , 23:659-664.

二级参考文献8

  • 1Sun Hungmin,Computer Communications,1999年,22卷,5期,193页
  • 2Sun Hungmin,Computer Communications,1998年,21卷,3期,279页
  • 3Lin Chuhsing,Computer Communications,1997年,20卷,15期,1381页
  • 4Lin C H. Dynamic key management schemes for access control in a hierarchy. Computer Communications, 1997, 20(15): 1381-1385.
  • 5Nechvatal J. Public Key Cryptography. Contemporary Cryptology: The Science of Information Integrity. Piscataway, IEEE Press, 1992.
  • 6William Stallings. Cryptography and Network Security. Second Edition, Prentice Hall International, Inc., 1999.
  • 7Lee N Y, Hwang Tzonelih. Comments on dynamic key management schemes for access control in a hierarchy. Computer Communications, Jan., 1999, 22(1): 87-89.
  • 8Denning D. Cryptography and Data Security. Addison-Wesley, Reading, MA, 1982.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部