期刊文献+

面向下一代会议系统的分布式密钥管理方案

The distributed conference key management scheme towards next generation conference system
原文传递
导出
摘要 提出了一种基于半信任实体的分布式会议密钥管理方案,解决了会议系统中多子组安全通信问题.多个服务器构成系统"半信任"中心,每个服务器根据Shamir门限秘密共享方案分别产生密钥份额.子组成员被划分为辅助者和普通成员2种不同角色,以提高密钥产生和分发的效率.辅助者利用拉格朗日插值定理恢复密钥份额,计算出子组密钥,并分发给其他会议成员.仿真实验证明了本方案的安全性、健壮性,且效率较高. The distributed conference key management scheme based on "semi-trusted" entity is proposed in the paper, to address the problem of secure communication in multi-subgroup for conference system. Several servers consist of the "semi-trusted" center of the system, each server generates key share respectively according to Shamir's threshold scheme. The members in the subgroup are divided into two different roles, coordinator and common member, in order to improve the efficiency of key generation and distribution. Coordinators use Lagrange interpolation function to recover key shares, and compute the key of subgroup, then distribute to other common members. The simulated results indicate the scheme is secure, robust, and highly efficient.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第6期71-73,85,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家重点基础研究发展计划资助项目(2006CB303104) 国家自然科学基金资助项目(40871200)
关键词 会议密钥 分布式 管理方案 门限秘密共享 半信任实体 conference key distributed management scheme threshold secret sharing semi-trusted entity
  • 相关文献

参考文献10

  • 1Chang C C, Lin H C. How to converse securely in a conference[C]//Proc IEEE 30th Ann, International Carnahan Conference, Lexington, Kentucky: IEEE Press, 1996: 42-45.
  • 2Chiou G, Chen W. Secure broadcasting using the secure lock[J]. IEEE Transactions on Software Engineering, 1989, 15(8):929-934.
  • 3Desmedt Y, Viswanathan V. Unconditionally Secure Dynamic Conference key Distribution[C]//Proceedings of the IEEE ISIT, Cambridge MA, USA: IEEE Press, 1998: 383-384.
  • 4Gouda M G, Huang C T, Elnozahy E N. Key trees and the security of interval multicast[C]//Proceedings of the 22nd ICDCS. Vienna: IEEE Computer Society, 2002: 467-468.
  • 5Steiner M, Tsudik G, Waidner M. CLIQUES: A new approach to group key agreemnet[C]//Proceedings of IEEE ICDCS'98, Amsterdam: IEEE Press, 1998: 380-388.
  • 6Wong C K, G M G, Lain S S. Secure group communications using key graphs[J]. IEEE/ACM Trans On Networking, 2000, 8(1) : 16-30.
  • 7Chan K C, Chan S H. Distributed servers approach for large-scale secure multicast[J]. IEEE Journal on Selected Areas in Communications, 2002, 20 (8): 1 500-1 510.
  • 8王斌,李建华.无可信中心的(t,n)门限签名方案[J].计算机学报,2003,26(11):1581-1584. 被引量:52
  • 9Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11) : 612-613.
  • 10Schneier B.应用密码学:协议、算法与C源程度[M].吴世忠,祝世雄,等译.北京:机械工业出版社,2000.

二级参考文献5

  • 1Desmedt Y, Frankel Y. Shared generation of authenticators. In:Proceedings of Crypto'91, Santa Barbara, California, USA, 1991.457~469
  • 2Wang C T, Lin C H, Chang C C. Threshold signature schemes with traceable signers in group communications. Computer Communications,1998,21(8): 771~776
  • 3Harn L. Group-oriented(t,n) threshold digital signature scheme and digital multisignature. IEE Proceedings of Computers and Digital and Technique,1994,141(5):307~313
  • 4Rosario G, Stanislaw J, Hugo K. Robust threshold DSS signatures. Information and Computation,2001,164(1):54~84
  • 5Agnew G B, Mulin R C, Vanstone S A. Improved digital signature scheme based on discrete exponentiation. Electronic Letters,1990,26(14):1024~1025

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部