期刊文献+

群密钥分配技术研究

Study of Group Key Distribution Technology
下载PDF
导出
摘要 随着网络技术的飞速发展,开放网络环境下群通信的安全性主要侧重于群密钥分配管理的研究,文章就目前相关文献已提出的开放网络环境下群通信进行分析讨论,并对该问题今后的研究方向提出了一些看法。 With the rapid development of the network technology, the security of group communication of the open network focuses on the group key allocation management research. This paper analyses the open network's group communication based on the related references and proposes some ideas for the future.
出处 《四川理工学院学报(自然科学版)》 CAS 2008年第2期58-60,共3页 Journal of Sichuan University of Science & Engineering(Natural Science Edition)
关键词 开放网络环境 群通信 安全性 open internet group communication security
  • 相关文献

参考文献13

  • 1Correia M, Verissimo P,Neves N F.The Architecture of a Secure Group Communicaiton System based on Intrusion Tolerance [J]. USA, Proceedings of the International Workshop on Applied Reliable Group Communication, 2001(8):30-36.
  • 2何明星,范平志,袁丁.一个可验证的门限多秘密分享方案[J].电子学报,2002,30(4):540-543. 被引量:29
  • 3Sandro,Rafaeli,Hutchison D.A survey of key management for secure group communication [R].ACM Computing Surveys,2003,3(35):45-48.
  • 4Mcgrew, Sherman. Key establishment in large dynamic groups [J].Glenwood, 1998(5):56-59.
  • 5Canetti R, Caray J, Itkis G, et al. A taxonomy and some effcient constructions [J]. New York, In Proc. of the INFOCOM'99, 1999(7):70-87.
  • 6Waldvogel M, Garonni G, Sun D, et al. Versatile group key management [J].IEEE Journal on Selected Areas in Communications, 1999,17(9):1614-1631.
  • 7Mittra S,Iolus.A framework for scalable secure multicasting [J]. Technologies,Architectures and Protocols for Computer Communication, 1997,21(5):277-288.
  • 8Kim Y, Perrig A, Tsudik G. Simple and fault-tolerant key agreement for dynamic collaborative groups [J].In Proc. of the 7th ACM Conf. on Computer and Communications Security,2000,52(5) :235-244.
  • 9Olivier C. Authenticated Group Diffie-Hellman Key- Exchange [J].Theory and Practice.Phd,I~uvain-la-Neuve, Belgique, Octobre 2002(8):23-26.
  • 10李先贤,怀进鹏,刘旭东.群密钥分配的动态安全性及其方案[J].计算机学报,2002,25(4):337-345. 被引量:26

二级参考文献14

  • 1张福泰 王育民 等.用签密构造可验证秘密分享方案.CCICS’2001论文集[M].北京:科学出版社,2001.244-248.
  • 2[1]Ateniese G, Chevassut D, Hasse D et al. The design of a group key agreement API. In: Proc DARPA Information Survivability Conference and Exposition, SC, USA, 2000. 115-126
  • 3[2]Caronni G, Waldvogel M, Sun D et al. Efficient security for large and dynamic groups. In: Proc the 7th Workshop on Enabling Technologies, (WET ICE'98), Stanford, California, USA,1998. 376-383. http://www.computer.org/ proceedings/wetice/8751/8751toc.htm
  • 4[3]Lakshminath R, Mukherjee S, Sama A. A dual encryption protocol for scalable secure multicasting. In: Proc the 4th IEEE Symposium on Computers and Communications, Red Sea, Egypt, 1999. 2-8
  • 5[4]Gong L, Shacham N. Elements of trusted multicasting. In: Proc IEEE International Conference on Network Protocols, Boston, MA, USA, 1994. 23-30
  • 6[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) Architecture. RFC 2094, 1997
  • 7[6]Blundo C, Santis A D, Herzberg A et al. Perfectly-secure key distribution for dynamic conferences. In: Proc CRYPTO'92, California, USA, 1992. 471-486
  • 8[7]Mayer A, Yung M. Generalized secret sharing and group-key distribution using short keys. In: Proc Compression and Complexity of Sequences 1997, Salerno, Italy, 1998. 30-44
  • 9[8]Chiou G H, Chen W T. Secure broadcasting using the secure lock. IEEE Trans Software Engineering, 1989,15(8): 929-934
  • 10[9]Ballardie T. Scalable Multicast Key Distribution. RFC 1949, 1996

共引文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部