期刊文献+

针对实时分布式应用的组密钥动态更新方案

Scheme of re-keying management in real-time distributed group communication
下载PDF
导出
摘要 针对有实时性需求的分布式组通信应用问题,提出基于哈希函数和BD协议的组密钥更新机制.建立以种子成员为主导的组密钥管理模型,密钥更新主要发生在局部范围,不会引起大范围的信息耦合现象.BD协议降低了组密钥链种子参数的生成时间,从而降低了密钥更新的时间.安全性,健壮性和效率分析表明:提出的组密钥更新机制在满足实时性要求的前提下,能保证信息的前向机密性和后向机密性.相对于Io-lus模型,不仅消除了GSC与GSI处单点失效引发的1toN问题,且不需在GSI处的转发环节,消除了GSI处的数据瓶颈问题. A scheme of re-keying management based on key chain and BD protocol applied to real-time distributed communication is proposed, The scheme sets up a key management model supervised by seed nodes, in which refreshing key mainly occurs locally so that it would not result in the situation of large-scaly exchanging information. The time cost of refreshing key was reduced because of BD protocol reducing the time cost of creating key-chain' s seed parameter. Under the analysis of security, robustness and efficiency, the scheme can guarantees forward and backward confidentiality yet still achieves the real-time property. Compared with Iolus model, the proposed scheme resolves the 1 to N problem due to single node failure and avoids data bottleneck occurring at GSI.
出处 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2008年第1期73-76,135,共5页 Journal of Harbin Institute of Technology
基金 国家重点基础研究发展规划资助项目(2005CB321806)
关键词 分布式组通信 实时性 BD协议 组密钥更新管理 distributed group communication real-time BD protocol re-keying management
  • 相关文献

参考文献14

  • 1HARNEY H, MUCKENHIRN C. Group key management protocol (GKMP) specification [ S]. RFC2093, 1997.
  • 2HARNEY H, MUCKENHIRN C. Group key management protocol (GKMP) architecture [S]. RFC2094, 1997.
  • 3CHIOU Guanghuei, CHEN Wentsuen. Secure broad-casting using the secure lock [J]. IEEE Transaction on Software Engineering, 1989, 15(8): 929-934.
  • 4WALDVOGEL M, CARONNI G, SUN Dan, et al. The VersaKey framework: Versatile group key management [ J]. IEEE Journal on Selected Areas in Communications, 1999, 17(9): 1614-1631.
  • 5DIFFE W, HELLMAN M E. New direction in cryptology [J]. IEEE Transactions on Information Theory, 1976, 22(6) : 644 -654.
  • 6STEINER M, TSUDIK G, CLIQUES W M. A new approach to group key agreement [C]//Proceedings of the 1998 18th International Conference on Distributed Computing Systems. Piscataway: IEEE Computer Society Press, 1998 : 380 -387.
  • 7BURMESTER M, DESMEDT Y. A secure and efficient conference key distribution system [C]//Advances in Cryptology-Eurocrypt ' 94. Berlin: Springer-Verlag, 1994:275 - 286.
  • 8BURMESTER M, DESMEDT Y. Efficient and secure conference key distribution[C]//Cambridge Workshop on Security Protocols of Lecture Notes in Computer Science. Berlin: Springer - Verlag, 1997 : 119 - 129.
  • 9BURMESTER M, DESMEDT Y. A secure and scalable group key exchange system [ J ]. Information Processing Letters, 2005,94 : 137 - 143.
  • 10MITTRA S. Iolus: A framework for scalable secure multicasting [ J ]. Computer Communication Review, 1997, 27(4): 277-288.

二级参考文献13

  • 1[1]Ateniese G, Chevassut D, Hasse D et al. The design of a group key agreement API. In: Proc DARPA Information Survivability Conference and Exposition, SC, USA, 2000. 115-126
  • 2[2]Caronni G, Waldvogel M, Sun D et al. Efficient security for large and dynamic groups. In: Proc the 7th Workshop on Enabling Technologies, (WET ICE'98), Stanford, California, USA,1998. 376-383. http://www.computer.org/ proceedings/wetice/8751/8751toc.htm
  • 3[3]Lakshminath R, Mukherjee S, Sama A. A dual encryption protocol for scalable secure multicasting. In: Proc the 4th IEEE Symposium on Computers and Communications, Red Sea, Egypt, 1999. 2-8
  • 4[4]Gong L, Shacham N. Elements of trusted multicasting. In: Proc IEEE International Conference on Network Protocols, Boston, MA, USA, 1994. 23-30
  • 5[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) Architecture. RFC 2094, 1997
  • 6[6]Blundo C, Santis A D, Herzberg A et al. Perfectly-secure key distribution for dynamic conferences. In: Proc CRYPTO'92, California, USA, 1992. 471-486
  • 7[7]Mayer A, Yung M. Generalized secret sharing and group-key distribution using short keys. In: Proc Compression and Complexity of Sequences 1997, Salerno, Italy, 1998. 30-44
  • 8[8]Chiou G H, Chen W T. Secure broadcasting using the secure lock. IEEE Trans Software Engineering, 1989,15(8): 929-934
  • 9[9]Ballardie T. Scalable Multicast Key Distribution. RFC 1949, 1996
  • 10[10]Dinsmore P T, Balenson D M, Heyman M et al. Policy-based security management for large dynamic groups: An overview of the DCCM project. In: Proc the DARPA Information Survivability Conference & Exposition, SC, USA, 2000. 64-73

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部