期刊文献+

基于同态加密机制的无线群组密钥分配协议 被引量:1

Wireless Group Key Distribution Protocol Based on Homomorphic Encryption Scheme
下载PDF
导出
摘要 根据无线群组通信的特点,基于同态加密机制采用集中式与分布式管理相结合的方法,提出一种新的安全无线群组密钥分配协议。该协议提供群组成员的认证和匿名性,具有前向保密性和后向保密性。协议初始化阶段完成了大部分计算,减少用户终端在协议执行过程中的计算量,满足无线群组通信的实时要求。分析表明,新协议安全性高,计算复杂度低,实时性好,简单且易于实现,适用于无线网络环境。 According to the feature of wireless group communication, a new group key distribution protocol in wireless network is proposed based on homomorphic encryption scheme. The scheme can realize member node authentication, anonymous identity, forward privacy and backward privacy. Calculation in advance introduced in initialization phase reduces the calculation cost of terminal in the process of execution, and satisfies real time request of wireless group communication. Moreover, performance of the scheme is analyzed. Result shows that the scheme has higher security, lower complexity, which satisfies the requirements of wireless network.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第7期158-160,共3页 Computer Engineering
基金 重庆市科委科技攻关基金资助项目(CSTC,2008AC2073) 教育部基金资助重点项目(207097) 重庆市自然科学基金资助项目(CSTC,2008BB2297)
关键词 无线网络 安全 群组通信 密钥分配 wireless network security group communication key distribution
  • 相关文献

参考文献10

二级参考文献40

  • 1刘建伟.数字移动通信网中的用户认证方案[J].空军电讯工程学院学报,1995(1):12-18. 被引量:4
  • 2徐胜波 王新梅.数字移动通信网中认证与密钥分配方案的研究.密码学进展-Chinacrypto'96[M].北京:科学出版社,1996.128-139.
  • 3[1]Ateniese G, Chevassut D, Hasse D et al. The design of a group key agreement API. In: Proc DARPA Information Survivability Conference and Exposition, SC, USA, 2000. 115-126
  • 4[2]Caronni G, Waldvogel M, Sun D et al. Efficient security for large and dynamic groups. In: Proc the 7th Workshop on Enabling Technologies, (WET ICE'98), Stanford, California, USA,1998. 376-383. http://www.computer.org/ proceedings/wetice/8751/8751toc.htm
  • 5[3]Lakshminath R, Mukherjee S, Sama A. A dual encryption protocol for scalable secure multicasting. In: Proc the 4th IEEE Symposium on Computers and Communications, Red Sea, Egypt, 1999. 2-8
  • 6[4]Gong L, Shacham N. Elements of trusted multicasting. In: Proc IEEE International Conference on Network Protocols, Boston, MA, USA, 1994. 23-30
  • 7[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) Architecture. RFC 2094, 1997
  • 8[6]Blundo C, Santis A D, Herzberg A et al. Perfectly-secure key distribution for dynamic conferences. In: Proc CRYPTO'92, California, USA, 1992. 471-486
  • 9[7]Mayer A, Yung M. Generalized secret sharing and group-key distribution using short keys. In: Proc Compression and Complexity of Sequences 1997, Salerno, Italy, 1998. 30-44
  • 10[8]Chiou G H, Chen W T. Secure broadcasting using the secure lock. IEEE Trans Software Engineering, 1989,15(8): 929-934

共引文献46

同被引文献14

  • 1李俊,崔国华,郑明辉.移动自组网络安全分布式组密钥管理方案[J].小型微型计算机系统,2007,28(6):991-997. 被引量:6
  • 2Khalili A, Katz J, Arbaugh W A. Toward secure key distribution in truly Ad-Hoc networks[C]//Proceedings of The Symposium on Applications and the Intemet Workshops. Los Alamitos: IEEE Computer Society Press, 2003 : 342-346.
  • 3Wong C K, Gouda M, Lain S S. Secure group Communications using key graphs[J]. IEEE ACM Trans Networking, 2000, 8 (1) : 16-30.
  • 4Ba|ensonD, McGrew, Sherma A. Keyrnanagement for large dy- namic groups :one-way function trees and amortized initialization [Z]. Interact-Draft Internet Engineering Task Force, Mar. 1999.
  • 5Tseng Y-M. A scalable key-management scheme with minimi- zing key storage for secure group communications[J]. Interna- tional Journal of Network Management, 2003,13 (6) : 419-425.
  • 6Domingo-Ferrer J, Herrera-Joaneomarti J. A new privacy homo- morphism and applieation[J]. Information Processing Letters, 1996,60 (5) : 227-282.
  • 7Rivest R L,Adleman L,Dertouzos M L. On data banks and pri- vacy homomorphisms[A]//De-millo R Aet al. Foundations of Secure Computation[C]. New Youk: Academic Press, 1978:169- 179.
  • 8Sander T,Tsehudin C. Protecting Mobile Agents Against Mali- cious Hosts[C]//the Proceedings of the 1998 IEEE Symposium of Research in Security and Privacy. Oakland, 1998.
  • 9Catalano D,Gennaro R,Grahamn H. The bit security of paillier encryption scheme and its application[C] //Advanees in Crypto- logyEurocrypt'01, Aarhus, Denmark, LNCS2045. Berlin, Springer-Verlag, 2001,229-243.
  • 10Cramer R,Shoup V. Universal hash proofs and a paradigm for a- daptive chosen ciphertext secure public-key encryption [C]// Advances in Cryptology-Eurocrypt'02, Amsterdam Nether- lands, LNCS 2332. Berlin: SpringerVerlag, 2002,45-94.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部