期刊文献+

基于LKH树批量密钥更新方案的一种优化

Optimization design of batch rekeying scheme based on LKH
下载PDF
导出
摘要 基于LKH树的批量密钥更新可以有效解决实时密钥更新所产生的低效和失序等问题。文献[1]中设计一种基于LKH树的优化批量密钥更新方案,提出建立动态变动子树、增大更新路径重叠的概率来降低加密次数。对文献[1]中的优化方法进行改进,将LKH树划分为三个子树:高频变动子树、过渡子树和相对稳定子树。通过分析并比较,该方法可以进一步增大更新路径重叠概率,降低加密次数。 Batch rekeying based on LKH can efficiently resolve the problems,such as inefficiency and out-of-sync,produced by individual rekeying.The reference of [1] designs an optimized batch rekeying scheme based on LKH and introduces a dynamic subtree to increase the probability of update paths overlap in order to reduce the number of encryption.This paper improves on optimized scheme of the reference.Three subtrees are divided in LKH tree:high frequency,transition and relative stabilization of subtree.This scheme can further increase the probability of update paths overlap to reduce the number of encryption from analysis and compare.
作者 汪伟 张伟
出处 《计算机工程与应用》 CSCD 北大核心 2008年第4期114-115,154,共3页 Computer Engineering and Applications
基金 安徽省教育厅教学研究基金(No.2005364)
关键词 批量更新 LKH树 优化方案 batch rekeying Logical Key Hierarchy tree optimized scheme
  • 相关文献

参考文献7

  • 1韩秀玲,王行愚.基于LKH树的动态多播群组批密钥更新方案的优化设计[J].计算机工程与科学,2005,27(8):20-23. 被引量:2
  • 2Li X S,Yang Y R,Gouda M G,et al.Batch rekeying for secure group communications[C].The 10th Int'l World Wide Web Conference, HongKong, 2001.
  • 3Rafaeli S,Mathy L,Hutchison D.LKH+2:aa improvement on the LKH+ algorithm for removal operations[EB/OL].Internet draft(work inprogress),Internet Eng,Task Force,http://www.watersprings.org/pub/ id/draft -rafaeli-lkh2-00.txt, 2002.
  • 4Pegueroles J,Rieo-Novella F,HernOndez-Serrano J,et al.Improved LKH for bateh rekeying in multieast groups[C].Proe of the IEEE Int'l Conf on Information Teehnology Researeh and Edueation ( ITRE 2003 ).New Jersey : IEEE Press, 2003 : 269-273.
  • 5Pegueroles J,Rico-Novella F.Balanced batch LKH:new proposal, implementation and performance evaluation[C].IEEE Symposium on Computers and Communications-ISCC'2003,2003.
  • 6许勇,陈恺.安全多播中基于成员行为的LKH方法[J].软件学报,2005,16(4):601-608. 被引量:14
  • 7Fall K,Varadhan K.The NS Manual(formerly NS Notes and Documentation ) [EB/OL].http ://www.isi.edu/nsnam/ns/ns -documentation. html, 2003.

二级参考文献18

  • 1Wong CK, Gouda M, Lam SS. Secure group communications using key graphs. IEEE/ACM Trans. on Networking, 2000,8(1):16-30.
  • 2Wallner D, Harder E, Agee R. Key management for multicast: Issues and architectures. RFC 2627, 1999.
  • 3Sherman AT, Mcgrew DA. Key establishment in large dynamic groups using one-way function trees. IEEE Trans. on Software Engineering, 2003,29(5):444-458.
  • 4Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B. The versaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 1999,17(9): 1614-1631.
  • 5Rafaeli S, Mathy L, Hutchison D. LKH+2: An improvement on the LKH+ algorithm for removal operations. Internet draft (work in progress), Internet Eng. Task Force, 2002. http://www.watersprings.org/pub/id/draft-rafaeli-lkh2-00.txt.
  • 6Pegueroles J, Bin W, Soriano M, Rico-Novella F. Group rekeying algorithm using pseudo-random functions and modular reduction.Grid and Cooperative Computing (GCC), Lecture Notes in Computer Science, 2004,3032:875-882.
  • 7Pegueroles J, Rico-Novella F, Hernandez-Serrano J, Soriano M. Improved LKH for batch rekeying in multicast groups. In: Proc. of the IEEE Int'l Conf. on Information Technology Research and Education (ITRE 2003). New Jersey: IEEE Press, 2003. 269-273.
  • 8Selcuk AA, Sidhu D. Probabilistic optimization techniques for multicast key management. Computer Networks, 2002,40(2):219-234.
  • 9K Almeroth, M Ammar. Collection and Modeling of the Join/Leave Behavior of Multicast Group Members in the Mbone[A]. High Performance Distributed Computing Focus Workshop(HPDC'96)[C]. 1996.209-216.
  • 10K Almeroth, M Ammar. Multicast Group Behavior in the Internet's Multicast Backbone(Mbone)[J]. IEEE Communication Magazine, 1997,35(6):224-229.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部