期刊文献+

基于m叉树与DMDH假设的组密钥协商协议

Group key agreement protocol based on m-tree and DMDH assumption
下载PDF
导出
摘要 针对动态对等通信环境下为提高群组密钥协商高效性与可扩展性,提出一种基于m叉树与DMDH假设的组密钥协商协议。该协议将m叉树结构与DMDH假设有机集合,通过协商可变m确定密钥树,从多线性映射簇中选择与之对应的多线性映射,进行群组密钥协商计算。同时可变m叉树结构来平衡该协议的计算开销与通信开销,更好地同时适用局域网与广域网环境,与TGDH、GDH相比,其有更好的安全性、高效性与可扩展性。 A group key agreement protocol based on m-tree and DMDH assumption is developed to improve the poor scalability and efficiency of most existing group key agreement protocols in dynamic peer communication.This protocol combined m-tree with DMDH assumption,which key agreement is completed by which all group members agreed on variable m to fix on key tree and selected corresponding multilinear map from cluster of multilinear maps.Meanwhile,it much more applied to LAN and WAN by which communication and computation costs are balanced by variable m.Compared with TGDH and GDH,it made a great progress in security,scalability and efficiency.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第3期461-464,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2007AA01Z405) 国家自然科学基金项目(60503012)
关键词 动态对等通信 安全群组通信 组密钥协商 m叉树 DMDH假设 dynamic peer communication secure group communication group key agreement m-tree DMDH assumption ..
  • 相关文献

参考文献8

  • 1Ohad Rodeh,Kenneth P Birman,Danny Dolev.The architecture and performance of security protocols in the ensemble group communication system using diamonds to guard the castle[J]. ACM Trans on Information and System Security, 2001,4 (3): 289-319.
  • 2Yair Amir, Cristina Nita-Rotaru, Jonathan Stanton, et al. Secure spread an integrated architecture for secure group communication[J].IEEE Transactions on Dependable and Secure Computing,2005,2(3):248-261.
  • 3Yair Amir, Yongdae Kim,Cristina Nita-Rotaru,et al.On the performance of group key agreement protocols[J].ACM Transactions on Information,2004,7(3):457-488.
  • 4王巍,马建峰,杨世平,赵文红.动态对等群组中高效安全的群组密钥管理方案[J].吉林大学学报(工学版),2008,38(1):131-136. 被引量:4
  • 5Stein M,Tsudik G,Waidner M.Key agreement in dynamic peer groups [J]. IEEE Trans on Parallel and Distributed Systems, 2000,11(8):769-780.
  • 6Kim Y, Perrig A, Sudik G.Tree-based group key agreement[J]. ACM Transactions on Information and System Security,2004,7 (7):60-96.
  • 7Lee PPC,Lui JCS,Yau DKY.Distributed collaborative key agreement and authentication protocols for dynamic peer groups[J]. IEEE Transactions on Networking,2006,14(2):263-276.
  • 8Boneh D,Silverberg A.Application of multi-linear forms to cryptography[J].Contemporary Mathematics,2003,324:71-90.

二级参考文献10

  • 1Harney H,Muckenhirn C.RFC2093:Group key management protocol (GKMP) specification[S].1997.
  • 2Wallner D,Harder E,Agee R.RFC2627:Key management for multicast:issues and architectures[S].1999.
  • 3Wong C,Gouda M,Lam S.Secure group communications using key graphs[J].IEEE/ACM Transactions on Networking,2000,8(1):16-30.
  • 4Choi K Y,Hwang J Y,Lee D H.Efficient ID-based group key agreement with bilinear maps[C]//LNCS 2947,Berlin:Springer-Verlag,2004:130-144.
  • 5Steiner M,Tsudik G,Waidner M.Key agreement in dynamic peer groups[J].IEEE Transactions on Parallel and Distributed Systems,2000,11 (8):769-780.
  • 6Yongdae K,Adrian P,Gene T.Simple and faulttolerant key agreement for dynamic collaborative groups[C] // Proceedings of the 7th ACM Conference on Computer and Communications Security,Athens:ACM Press,2000:235-244.
  • 7Naor D,Naor M,Lotspiech J.Revocation and tracing schemes for stateless receivers[C] // LNCS 2139,Berlin:Springer-Verlag,2001:41-62.
  • 8Boneh D,Silverberg A.Applications of multi-linear forms to cryptography[J].Contemporary Mathematics,2003,324:71-90.
  • 9Boneh D,Franklin M.Identity based encryption from the Weil pairing[J].SIAM Journal of Computing,2003,32(3):586-615.
  • 10Galbraith S D,Harrison K,Soldera D.Implementing the Tate pairing[C] //LNCS 2369,Berlin:Springer-Verlag,2002:324-337.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部