期刊文献+

基于优化GDH协商的高效安全群组密钥管理方案 被引量:1

High efficient and secure group key management scheme based on optimized GDH
原文传递
导出
摘要 针对GDH(group diffie-hellman)方案中节点可能成为系统的瓶颈以及计算复杂度、通信代价和存储复杂度远高于某些集中式方案等缺陷,提出并实现了一种基于优化GDH协商的高效安全的动态群组密钥管理方案,并对其安全性进行了证明。通过对计算量和通信量进行分析比较表明,优化GDH协商协议具有很大的优势,并且能够快速产生或更新组密钥,具有很强的实用性。 There are some defects in GDH(group diffie-hellman) scheme,such as the node that may become the bottleneck of the system, and the computational complexity, cost of communications and storage complexity that are much higher than some centralized group key management program. An efficient and secure dynamic group key management scheme based on optimized GDH is proposed and implemented and its security is proven. The optimized GDH consensus agreement has great advantage than GDH by comparing and analysing the volume of calculating and traffic. At the same time, the optimized GDH con- sensus agreement can quickly produce and update group key,and it owns highly practicability.
出处 《光电子.激光》 EI CAS CSCD 北大核心 2010年第4期584-587,共4页 Journal of Optoelectronics·Laser
基金 国家自然科学基金资助项目(60873179) 广西教育厅科研资助项目(200707LX196)
关键词 组密钥协商 GDH 优化GDH 动态子群 群组通信 group key agreemen GDH optimized GDH dynamic subgroup group communication
  • 相关文献

参考文献12

  • 1Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee. Efficient ID-based group key agreement with bilinear maps[J]. LNCS, 2004,2947 : 130-144.
  • 2Boneh D, Franklin M. Identity based encryption from the Weil pairing[J]. SIAM Journal of Computing,2003,32(3) :586-6]5.
  • 3王巍,马建峰,杨世平,赵文红.动态对等群组中高效安全的群组密钥管理方案[J].吉林大学学报(工学版),2008,38(1):131-136. 被引量:4
  • 4Kyung-Hyune Rhee,Young-Ho Park,Gene Tsudik. A group key management architecture for mobile ad-hoc wireless networks [J]. Journal of Information Science and Engineering, 2005,21 (2) ..415-428.
  • 5张湛,刘光杰,王俊文,戴跃伟,王执铨.基于Markov链安全性的量化隐写算法[J].光电子.激光,2009,20(7):944-949. 被引量:8
  • 6王志伟,谷大武.基于树结构和门限思想的组密钥协商协议[J].软件学报,2004,15(6):924-927. 被引量:11
  • 7Xukai Zou,Byrav Ramamurthy A block-free TGDH key agreement protocol for secure group communications[A].IASTED International Conference on Parallel and Distributed Computing and Networks[C].2004, ICPDCN 2004 : 288-293.
  • 8Kim Y, Perrig A, Tsudik G. Simple and fault-tolerant key agreement for dynamic collaborative groups[A]. 7th ACM Conference On Computer and Communications Security[C] ,2000, COOS 2000 : 235-244.
  • 9Wong C,Gouda M,Lam S. Secure group communications using key graphs[J]. IEEE ACM Transactions on Networking, 2000,8 (1) :16-30.
  • 10Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, et al. On the performance of group key agreement protocols[J]. ACM Transactions on Information and System Security, 2004,7 (3) : 457-488.

二级参考文献28

  • 1Burmestrer M, Desmedt Y. A security and efficient conference-key agreement key distribution system. Advances in Cryptology -EUROCRYPT'94. Berlin: Springer-verlag, 1994. 275-287.
  • 2Kim Y, Perrig A, Tsudik G. Communication-Efficent group key agreement. In: Dupuy M, Paradinas P, eds. Proc. of the IFIP SEC 2001. 2001. 229-244.
  • 3Stein M, Tsudik G, Waidner M. Key agreement in dynamic peer groups. IEEE Trans. on Parallel and Distributed Systems,2000,11 (8):769-780.
  • 4Kim Y, Perrig A, Tsudik G. Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Sander T, ed. Proc. of the 7th ACM Conf. on Computer and Comunications Security. New York: ACM Press, 2000. 235~244.
  • 5Lai XS, Han L, Zhang ZC ,Zhang YQ, Xiao GZ. Computer Cryptography and Application. Beijing: National Defence Industry Publishing House, 2001(in Chinese).
  • 6Amir Y, Kim Y, Nita-Rotaru C, Tsudik G. On the performance of group key agreement protocols, 2001. http://www.cnds.jhu.edu/pub/papers/cnds-2001-5.ps.gz
  • 7Harney H,Muckenhirn C.RFC2093:Group key management protocol (GKMP) specification[S].1997.
  • 8Wallner D,Harder E,Agee R.RFC2627:Key management for multicast:issues and architectures[S].1999.
  • 9Wong C,Gouda M,Lam S.Secure group communications using key graphs[J].IEEE/ACM Transactions on Networking,2000,8(1):16-30.
  • 10Choi K Y,Hwang J Y,Lee D H.Efficient ID-based group key agreement with bilinear maps[C]//LNCS 2947,Berlin:Springer-Verlag,2004:130-144.

共引文献21

同被引文献12

  • 1徐守志,杨宗凯,谭运猛.基于椭圆曲线的分布式组播密钥管理方案[J].小型微型计算机系统,2006,27(4):651-654. 被引量:3
  • 2魏楚元,李陶深,王高才.一种改进的动态对等群组分担式密钥协商协议[J].小型微型计算机系统,2007,28(5):805-811. 被引量:1
  • 3张骏,马范援,谷大武,白英彩.基于限高树的TGDH组密钥管理协议[J].计算机应用与软件,2007,24(6):1-2. 被引量:1
  • 4ZHANG Zhan,LIU Guang jie,WANG Jun-wen,et al.A novel qualtization-embedded steganographic algorithm based on Markov chain security[J].Journal of Optoelectronics﹒Laser,2009,20(7):944-949.
  • 5M.Steiner,G.Tsudik,and M.Waidner.CLIQUES:A new approach to group key agreement[A].In:IEEE International Conference on Distributed Computing Systems[C],1998,pp.380-387.
  • 6Diffie W,Hellman ME.New directions in cryptography[J].IEEE Trans.on Information Theory,1976,22(6):644-654.
  • 7Steiner M,Tsudik G,Waidner M.Diffle-Hellman key distribution extended to group communication[C]//Proc,3rd ACM Conf.on Computer and Communication Security.1996,pp.31-37.
  • 8Rodeh O,Birman K,Dolev D.Optimized group rekey for group communication systeims[R].Technical Report,Hebrew University,1999.
  • 9Y.Kim,A.Perrig,G.Tsudik.Tree-based group key agreement[J].ACM Trans.Inf.Syst.Secur,2004,7(1):60-96.
  • 10Chiang,Tzu-Chiang;Chang,Jia-Lin;Lin,Shih-Wei.A Distributed Multicast Protocol with Location-Aware for Mobile Ad-Hoc Networks[J].Advances in Intelligent and Soft Computing,2011(2):691-697.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部