期刊文献+

基于ECC的动态安全组播密钥协商方案 被引量:1

KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM FOR DYNAMIC SECURE MULTICAST
下载PDF
导出
摘要 设计高效的密钥协商方案是动态安全组播的难点。提出一个应用椭圆曲线密码体制进行密钥协商而在基于身份的公钥系统内进行组通信的全新安全组播方案。具体地分析了子组成员的密钥协商和子组间的通信过程,以及组成员动态变化时密钥的更新过程,结果表明,该方案在降低计算和通信代价方面取得了较好的效果,且满足密钥协商的安全要求。 Designing key management is a difficult task in dynamic secure muhicast. In this paper, we propose a novel secure muhicast scheme with key agreement based on Elliptic Curve Cryptosystem and group communication inside Identity-based Public Key Cryptography system. Then the key agreement between the members in a subgroup and the procedures of secret communications between subgroups as well as updating of group keys with the dynamic change of group members are analyzed in detail. The analysis shows that our scheme is efficient in computation and communication and satisfies the security requirement of the key agreement.
作者 陈礼青
出处 《计算机应用与软件》 CSCD 2009年第8期35-37,61,共4页 Computer Applications and Software
基金 国家自然科学基金项目(60673070) 江苏省自然科学基金项目(BK2006217)
关键词 安全组播 密钥协商 椭圆曲线密码体制 基于身份的公钥密码系统 Secure multicast Key agreement Elliptic curve cryptosystem ID-PKC
  • 相关文献

参考文献6

  • 1Deering S.Host Extensions for IP Multicasting[S].RFC 1112,IETF,989.
  • 2张方国,王育民.超椭圆曲线密码体制的研究与进展[J].电子学报,2002,30(1):126-131. 被引量:17
  • 3Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//In:Advances in Cryptology-CRYPTO'84.Berlin:Springer-Verlag,1984:47-53.
  • 4Boneh D,Franklin M.Identity-Based Encryption from the Weil Pairing[C]//In:Advances in Cryptology-CRYPTO '01,LNCS 2139.2001:213-229.
  • 5Sun M,Su C,et al.Design of A Scalable RSA and ECC Crypto-processor[C]//In:Proceedings of the ASP-DAC.2003:495-498.
  • 6Oorschot P,Wiener M.Parallel Collision Search with Cryptanalytic Applications[J].Journal of Cryptology,1999,12(1):1-28.

二级参考文献36

  • 1[1]N Koblitz. Elliptic curve cryptosystems [J]. Math. Comp. 1987, 48(177):203-209.
  • 2[2]V S Miller. Use of elliptic curve in cryptography [ A].In GRYPTO'85( Santa Barbara, Calif., 1985 ), LNCS. 218 [ C ], Spring- Verlag. 1986:417 - 426.
  • 3[3]N Koblitz. Hyperelliptic cryptography [ J ]. J. of Crypto., 1989, 1 (3):139- 150.
  • 4[4]D G Cantor. Computing in the jacobian of a hyperelliptic curve [J].Math. Comp., 1987,48:95 - 101.
  • 5[5]N Koblitz. Algebraic Aspects of Cryptography [ M]. Algorithms and Comutation in Math.3,Springer-Verlag 1998.
  • 6[6]Mumford D. Tata Lectures on Theta Ⅱ [ M ]. Birkhauser-Verlag,Boston. 1984.
  • 7[7]Paulus Ruck, H -G. Real and imaginary quadratic representations of hvperelliptic fmction fields logarithms [ J ]. Math. Comp., 1999, 68:1233 - 1241.
  • 8[8]A Stein. Sharp upper bound for arithmetics in hyperelliptic function rields [ R ]. Techn. Report CORR # 99-23, University of Waterloo (2000) ,68 pages. http://www. cacr. math. uwaterloo. ca.
  • 9[9]Andreas Enge. The extended euclidian algorithm on polynomials, and the computational efficiency of hyperelliptic cryptosystems. http://www. math. umi-augsburg. de/~ enge/Publikationen. html.
  • 10[10]Robin Hartshome. Algebraic Geometry [ M]. GTM 52,Springer-Verlag,New York 1977.

共引文献16

同被引文献8

  • 1金纯,陈许,万正兵,万宝红.基于单向机顶盒的双向增值业务实现方案[J].广播与电视技术,2007,34(3):134-136. 被引量:3
  • 2金纯,万正兵,王晓,万宝红,罗凤,陈许.基于广电网的蓝牙红外通讯遥控器设计[J].广播与电视技术,2007,34(4):117-118. 被引量:3
  • 3CHEN T S, HUANG G S.Digital signature scheme resuhed from identification protocol by elliptic curve cryptosystem[C]//Proc. 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering Proceedings.[S.l.] : IEEE Press, 2002 : 192-195.
  • 4SEC 1 v1.5, Elliptic curve cryptography (working draft vl.5.standards for efficient cryptography) [S].2005.
  • 5RFC 3641, Generic string encoding rules(gser)for asn. 1 types[S].2003.
  • 6ROBERT Z.Elliptic curve cryptography support in entrust v 1.0[EB/OL]. [2010-05-09].http ://www.entrust.com/resources/download.cfm/21138/ elliptic_curve_ vl01 .pdf.
  • 7SHEN Guicheng, ZHENG Xuefeng.Research on the implementation of elliptic curve cryptosystem based on object-oriented method[C]// Proc. 2008 International Symposium on Electronic Commerce and Security.[S.1.] : IEEE Press, 2008 : 1-4.
  • 8陆洁茹,朱艳琴.SSL中ECC数字证书的设计与实现[J].计算机应用与软件,2007,24(12):38-40. 被引量:7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部