期刊文献+

基于门限的分布式会议密钥管理方案

A Distributed Conference Key Management Scheme Based on Threshold Cryptography
原文传递
导出
摘要 会议密钥管理通过为参与组通信的成员生成、分发和更新会议密钥来满足加密认证等安全需求。基于可验证秘密分享机制和门限密码技术,提出了一种可验证的分布式会议密钥管理方案,方案不仅能满足前向安全性和后向安全性,而且能抵制恶意节点的主动攻击和拒绝服务攻击。同时,方案中的秘密份额更新算法能有效抵制退出节点的合谋攻击。 Conference key management for muhicast is used for group members in one mtdticast session to generate, refresh and transfer conference key, which is used for encryption and authentication. Based on the verifiable secret sharing mechanism and threshold cryptography, a new verifiable distributed conference key management scheme is proposed. The presented scheme can not only satisfy the forward confidentiality and backward confidentiality, but also resist active attacks and denial of services. It also presents an efficient algorithm for updating the group secret share and proves that can resist the coalition of the left nodes.
出处 《武汉理工大学学报》 CAS CSCD 北大核心 2009年第18期12-15,54,共5页 Journal of Wuhan University of Technology
基金 国家自然科学基金(60703048) 湖北省教育厅科研基金(D20092903 B20082906)
关键词 密钥管理 会议密钥 可验证秘密分享 合谋攻击 key management conference key verifiable secret sharing coalition attacks
  • 相关文献

参考文献12

  • 1Quinn B, Almeroth K. IP Multicast Applications: Challenges and Solutions ,[ S]. LEFT RFC3170, 2001.
  • 2徐明伟,董晓虎,徐恪.组播密钥管理的研究进展[J].软件学报,2004,15(1):141-150. 被引量:66
  • 3Wallner D, Harder E, Agee R. Key Management for Multicast: Issues and Architectures [S]. RFC 2627, 1999.
  • 4Rodeh O, Birman K, Dolev D. Optimized Group Re-key for Group Communication Systems [ S]. Hebrew University, 1999.
  • 5Banerjee S, Bhattacharjee B. Scalable Secure Group Communication over IP Multicast [J]. JSAC Special Issue on Network Support for Group Communication, 2002,20(8) : 156-163.
  • 6Setiner M, Taudik G, Waidnet M. Cliques: A New Approach to Group Key Agreement IS]. RZ 2984, IBM Research, 1997.
  • 7Becker C, Wille U. Communication Complexity of Group Key Distribution [ C] //In Proceedings of the 5th ACM Conference on Computer and Communications Security. ACM, New York. 1998.79-81.
  • 8Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 24(11) : 612-613.
  • 9Feldman P. A Practical Scheme for Non-interactive Verifiable Secret Sharing [ C] //Proceedings of 28th IEEE symposium on Foundations of Computer Science. Canada: IEEE, 1987. 123-126.
  • 10Chaum D, Pedersen T P. Wallet Databases with Observers [ C]//In Advances in Cryptology-CRYPTO '92, volume 740 of Lecture Notes in Computer Science, Springer-Verlag. Berlin, 1993.95-97.

二级参考文献27

  • 1[1]Harney H, Muckenhirn C. Group key management protocol (GKMP) specification. RFC2093, 1997.
  • 2[2]Harney H, Muckenhirn C. Group key management protocol (GKMP) architecture. RFC2094, 1997.
  • 3[3]Setiner M, Taudik G, Waidnet M. Cliques: A new approach to group key agreement. Technical Report, RZ 2984, IBM Research, 1997.
  • 4[4]Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,IT-22(6):644~654.
  • 5[5]Mittra S. Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM Computer Communication Review, Volume 27, Issue 4. New York: ACM Press, 1997. 277~288.
  • 6[6]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architec-tures. RFC 2627, 1999.
  • 7[7]Waldvogel M, Garonni G, Sun D, Weiler N, Plattner B. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications (Special Issue on Middleware), 1999,17(9):1614~1631.
  • 8[8]Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: One-Way function trees and amortized initialization. IETF Internet Draft (work in progress), 2000.
  • 9[9]Canetti R, Caray J, Itkis G, Micciancio D, Naorr M, Pinkas B. Multicast security: A taxonomy and some efficient constructions. In: Proc. of the INFOCOM'99. New York, 1999. 708~716.
  • 10[10]Yang L, Li XS, Zhang XB, Lam SS. Reliable group rekeying: A performance analysis. In: ACM SIGCOMM 2001. San Diego, 2001. 27~31.

共引文献79

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部