期刊文献+

一种最小密钥更新量组批更新算法

An Batch Renew Algorithm of Minimum Key Updating for Secure Group Communication
下载PDF
导出
摘要 安全组通信多采用基于逻辑k叉树的方案,其时间开销和组播带宽开销决定着系统的可扩展性能,主要影响因素包括密钥更新量、组播包数和加密量,而中间节点更新量是最直接的原因.由于三者均与组规模、用户改变数和用户分布有关,已有的方案不能适应大规模组和用户频繁变动的环境.本文提出组密钥分发的最小准确覆盖问题,并证明一种启发式的解.以此为基础,提出密钥更新量趋于零的组批更新算法,简称GMEC,算法可以在确保前向安全和后向安全的前提下同时处理任意多用户变更请求.结果表明本算法的效率有明显提高. Secure group communication always adopts K-ray logical tree based scheme. Its scalability is enslaved to costs of time and multicast bandwidth, which are restrained by the number of middle nodes updated, multicast packets and encryptions, where the first one is the key factor. Since these are related to the group size, number of changes and their distribution, all existing works doesn't meet the commands of applications with large group size and high dynamic members. In this paper, Minimum Exact Cover Problem (MECP) for key distribution is presented, and a heuristic solution is testified. Based on it, an algorithm named GMEC of batch rekeying with renewing cost tending to zero is illustrated, which can process any large number of change requests with best secrecy guaranteed. The result shows that the algorithm can improve efficiency more.
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第2期247-250,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60572049 f010106)资助.
关键词 安全组通信 密钥管理 最小准确覆盖 批量更新 前向安全 后向安全 层次密钥树 secure group communication key management minimum exact cover problem batch re-keying forward secrecy backward secrecy logical hierarchical, tree
  • 相关文献

参考文献14

  • 1Harney H,Muckenhirn C.Group key management protocol (GKMP) specification[S].RFC 2093,1997.
  • 2Wallner D,Harder E,Agee R.Key management for multicast:issues and architectures[S].RFC 2627,1999.
  • 3Setia S,Koussih S,Jajodia S,et al.Kronos:a scalable group re-keying approach for secure multicast[A].IEEE Symposium on Security and Privac[C].Oakland (USA) CA:IEEE Computer Society Press,2000,215-228.
  • 4Pegueroles J,Rico-Novella F,Hernandez-Serrano J,et al.Improved LKH for batch rekeying in multicast groups[A].International Conference on Information Technology[C],New York (USA):IEEE,2003,269-273.
  • 5Duma C,Shahmehri N,Lambrix P.A hybrid key tree scheme for multicast to balance security and efficiency requirements[A].12th IEEE International Workshop on Enabling Technologies-Infrastructure for Collaborative Enterprises[C],Los Alamitos (USA),CA:IEEE Computer Society Press,2003:208-213.
  • 6Sherman A T,McGrew D A.Key establishment in large dynamic groups using one-way function trees[J].IEEE Trans.on Software Engineering,2003,29(5):444-458.
  • 7屈劲,葛建华,蒋铭.安全组播密钥批更新算法研究[J].电子学报,2003,31(7):1046-1048. 被引量:12
  • 8赵欣,吴敏强,陈道蓄,谢立.一个自适应的安全组通信秘钥更新算法[J].电子学报,2003,31(5):654-658. 被引量:6
  • 9Huang W C,Kao C Y,Horng J T.A genetic algorithm approach for set covering problems[A].In:Proceedings of the First IEEE Conference on Evolutionary Computation[C],Los Alamitos (USA),CA:IEEE Computer Society Press,1994,2:569-574.
  • 10Ghanem S M,Abdel-Wahab H.A simple XOR-based technique for distributing group key in secure multicasting[A].5th IEEE Symposium on Computers and Communications[C],Los Alamitos(USA),CA:IEEE Computer Society Press,2000,166-171.

二级参考文献11

  • 1S Setia, S Koussih, S Jajodia, E Harder. Kronos: A scalable group rekeying approach for secure multicast[A]. Proceedings of IEEE Symposium on Security and Privacy [ C]. Berkeley, CA. Los Alamitos, Calif:IEEE Computer Society, c2000, May 2000.
  • 2David Balenson, David McGrew, Alan Sherman. Key Management for Large Dynamic Groups:One- way Function Trees and Amortized Initialization[ S]. INTERNET-DRAFT, 1999.
  • 3S Mittra.IoIus:A framework scalable secure multicast[A] .Proceedings of ACM SIGCOMM' 97 [C]. Cannes, France, New York, NY, USA:ACM Press, September 1997.
  • 4Chung Kei Wong, Mohamed Gouda, Simon S Lam. Secure group communications using key graphs[A].Proceedings of ACM SIGCOMM'98[C] .New York,NY, USA:ACM Press,September 1998.
  • 5RFC2236. Internet Group Management Protocol, V. :2. [ S ].
  • 6D Wallner, E Harder, R Agee. Key management for multicast: Issues and Architectures, IETF Internet Draft [Z]. 1998.
  • 7C K Wong, M G Gouda, S S Lain. Secure group communications using key graphs [A] .Proceedings of ACM SIC, COMM'98 [C] .New York:ACM Press, 1998.68 - 79.
  • 8S Setia, S Koussih, S Jajodia, E Harder. Kronos: a scalable group rekeying approach for secure multicast [ A ]. IEEE Symposium on Security and Privacy [C]. Oakland(USA) CA: IEEE Computer Society Press,2000.215-228.
  • 9X S Li,Y R Yang, M G Gouda, S S Lain. Batch rekeying for secure group communications [ A ]. Proceedings of Tenth International World Wide Web Conference [ C ]. Hongkong: ACM,2001.
  • 10K Almeoth, M Ammar. Collection and modeling of the join/leave behavior of multicast group members in mbone [ A]. Proceedings of High Performance Distributed Canputing Focus Workshop(HPDC'96) [ C].New York:IIPDC, 1996.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部