期刊文献+

具有PFS特性的流媒体安全通信协议

Scalable streaming media secure communication protocol with perfect forward secrecy
下载PDF
导出
摘要 设计面向可伸缩媒体流的安全通信协议以保证可伸缩流媒体服务系统能够为相同的节目源设计不同质量等级的输出码流并确保安全传输。通信协议由客户端、认证服务器和视频服务器3个实体的交互完成,通过基于Diffie-Hellman算法的密钥交换和基于证书机制的双向认证确保产生的临时会话密钥的机密性和通信过程的PFS特性。通过采用CBC模式的对称加密算法、ID与随机数的串接以及用临时密钥加密密钥协商消息等安全机制来确保增强的安全性以抵抗反射攻击和中间人攻击。 This paper presents a communication protocol of streaming media to ensure secure live transferring of scalable quality video programs over network.In the protocol,client,authentication server and video server collaborate for authentication,generation of session keys and transferring of encrypted streaming media.Bi-direction authentication is carried out by bi-direction challenge method and method based on public-key cryptography.Perfect forward secrecy is provided by adoption of Diffie-Hellman key exchange steps.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第23期133-135,共3页 Computer Engineering and Applications
基金 天津科技攻关计划项目(No.06YFGZGX17500) 天津教委科技发展基金项目(No.20061019)
关键词 多媒体安全 完美前向保密 身份认证 可伸缩流媒体 multimedia security perfect forward secrecy authentication scalable streaming media
  • 相关文献

参考文献6

二级参考文献28

  • 1韩明军,王伟,胡桂苓.一种远程监控中的数据加密方案[J].微计算机信息,2005,21(07X):69-71. 被引量:8
  • 2Friedman G. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, 1993,39:905-910.
  • 3Lin ET, Delp EJ. A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999. 35-39.
  • 4Fridrich J. Methods for tamper detection in digital images. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999.29-33.
  • 5Wong PW. A public key watermark for image verification and authentication. In: Proceedings of the International Conference on Image Processing, Vol 1. Chicago: IEEE Computer Society Press, 1998. 425- 429.
  • 6Katzenbeisser S. On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking. In: Proceedings of the 5th International Query Processing and Multimedia Issues in Distributed Systems Workshop.Munich: IEEE Computer Society Press, 2001.815-819.
  • 7Nahrstedt K, Dittmann J, Wohlmacher P. Approaches to multimedia and security. In: Proceedings of the IEEE International Conference on Multimedia and Expo. New York: IEEE Computer Society Press, 2000. 1275-1278.
  • 8Schneider M, Chang SF. A robust content based digital signature for image authentication, In: Proceedings of the IEEE International Conference on Image Processing, Vol 3. Lausanne: IEEE Computer Society Press, 1996, 227-230.
  • 9Lou DC, Liu JLo Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics, 2000,46(1):31-39.
  • 10Deng H, Gong L, Lazer A, et al. Practical protocols for certified electronic mail. Journal of Network and System Management,1996.4(3 ):279-297.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部