期刊文献+

一种入侵容忍的广播通讯KDC方案 被引量:1

An intrusion tolerant KDC scheme for multicast communication
下载PDF
导出
摘要 在使用密钥管理中心(KDC)进行广播通讯密钥分配的网络安全协议中,保证KDC的安全并提供高效率的密钥服务是一个非常重要的课题。区别于目前的域分割和服务器备份方案,使用双变量多项式作为门限构造函数,在多个分布式KDC服务器上分发不同的伪随机数产生函数,需要特定数目的授权服务器联合才能计算出最终的对称密钥,保证少于一定数目的KDC服务器被攻击后不能对系统产生威胁,从而保证了分布式KDC的安全性,并且能够避免广播通讯密钥分配过程中的效率瓶颈和单点失败。 Key Distributed Center (KDC) is an important component for generating symmetric key in multicast communication without using public key cryptography. It is important to keep KDC security and provide efficient symmetric key service. Different from the current partition to domain or replication solution, the proposed scheme uses bivariate polynomials to construct threshold distributed pseudo-random function, distribute the bivariate polynomials across the KDC servers, only the united authorized set of servers can compute the pseudo random for key. It ensure certain number of unauthorized server will not threaten the security of the whole network after being attacked. Therefore, enhance the security of distributed KDC servers was enhanced, and bottlenecks or single points of failure can be prevented.
出处 《计算机应用》 CSCD 北大核心 2007年第5期1038-1040,1053,共4页 journal of Computer Applications
基金 国家973规划资助项目(G1999035802) 国家863计划资助项目(2001AA141120)
关键词 入侵容忍 密钥管理中心 伪随机数产生函数 对称密钥 intrusion tolerant Key Distributed Center (KDC) pseudo random function symmetric key
  • 相关文献

参考文献10

  • 1NEEDHAM R,SCHROEDER M.Using encryption for authentication in large networks of computers[J].Communication of the ACM,1978,21 (12):993-999.
  • 2OTWAY D,REES O.Efficient and timely mutual authentication.Operating Systems Review,1987,21(1):8-10.
  • 3BURROWS M,ABADI M,NEEDHAM R.A logic of authentication[A].Proceedings of the Royal Society of London A,1989,426:233-271.
  • 4DENNING D,SACCO G.Timestamps in key distribution protocols[J].Communications of the ACM,1981,24,(8):533-536.
  • 5WOO T,LAM S.A lesson on authentication protocol design[J].Operating systems Review,1994,28(3):24-37.
  • 6MILLER SP,NEUMAN C,SCHILLER JI,et al.Kerberos authentication and authorization system[M].Project Athena Technical Plan Section E.2.1,MIT,1987.
  • 7SHOUP V.Practical threshold signatures[A].Proceedings of the Eurocrypt 2000[C].Bruges (Brugge):Springer-Verlag,2000.207-220.
  • 8FRANKEL Y,GEMMELL P,MACKENZIE PD,et al.Optimal-Resilience proactive public-key cryptosystems[A].IEEE Symposium on Foundations of Computer Science[C].1997.384 -393.
  • 9CANETTI R,GENNARO R,HERZBERG D,et al.Proactive Security:Long-term protection against break-ins[J].CryptoBytes,1997,3(1).
  • 10MCELIECE RJ,SARWATE DV.On sharing secrets and Reed-Solomon Codes[J].Communications of the ACM,1981,24(9):583 -584.

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部