期刊文献+

安全高效的群组密钥协商协议

Secure and efficient group key agreement protocol
下载PDF
导出
摘要 群组密钥协商(GKA)是保证随后安全通信的重要手段之一。提出了一种新的群组密钥协商协议,在协议中,参与者可以通过一系列算法对其他参与者的真伪进行验证。该协议以较低的计算成本实现参与者安全的会话密钥协商,具备可容错性和长期私钥可重用性的特点。分析表明可抵抗多数常见攻击。 Group Key Agreement ( GKA ) is one of the important methods to ensure the subsequent secure communication. A new group key agreement protocol was proposed in this paper. In this protocol, the participants could verify the honesty of other participants by a series of algorithms. The new protocol realized the secure session key agreement with lower computational cost. In addition, it has the fault-tolerance property and the long term key-reuse property. The performance analysis results show that this protocol can resist many common attacks.
出处 《计算机应用》 CSCD 北大核心 2010年第9期2401-2403,2448,共4页 journal of Computer Applications
基金 湖南省教育教学改革研究项目(ZJGB2009010)
关键词 密码学 群组密钥协商 可容错性 可扩展性 cryptography Group Key Agreement ( GKA) fault-tolerance expandability
  • 相关文献

参考文献19

  • 1CHUNG I, CHOI W Y, KIM Y, et al. The design of conference key distribution system employing a symmetric balanced incomplete block design [ J]. Information Processing Letters, 2002, 81 (6) : 313 -318.
  • 2CAI Yongquan WANG Yali.Identity-Based Conference Key Distribution Protocol with User Anonymity[J].Chinese Journal of Electronics,2007,16(1):179-181. 被引量:3
  • 3YI X, SIEW C K, TAN C H, et al. A secure conference scheme for mobile communications [ J]. IEEE Transactions on Wireless Communication, 2003, 2(6) : 1168 - 1177.
  • 4WANG N, FANG S. A hierarchical key management scheme for secure group communications in mobile Ad Hoc networks [ J]. Journal of Systems and Software, 2007, 80(10) : 1667 - 1677.
  • 5CHANG C, TSAI H, CHANG P, et al. A collaborative conference key agreement scheme by using an intermediary node [ C]// Proceodings of the 2007 International Conference on Convergence Information Technology. Washington, DC: IEEE Computer Society, 2007:54-59.
  • 6KIM W, RYU E, IM J, et al. New conference key agreement protocol with user anonymity [ J]. Computer Standards and Interfaces, 2005, 27(2): 449-453.
  • 7BURMESTER M, DESMEDT Y. A secure and efficient conference key distribution system [ C ]// Advances in Cryptology - EUROCRYPT'94, LNCS 950. Berlin: Springer, 1994:275-286.
  • 8KIM Y, PERRIG A, TSUDIK G. Group key agreement efficient in communication [ J]. IEEE Transactions on Computers, 2004, 53 (7): 905 -921.
  • 9STEER D, STRAWCZYNSKI L, DIFFIE W, et al. A secure audio teleconference system [ C]//Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology, LNCS 403. Berlin: Springer, 1988:520-528.
  • 10STEINER M, TSUDIK G, WAIDNER M. Key agreement in dynamic peer groups [ J]. IEEE Transactions on Parallel and Distributed Systems, 2000, 11 (8) : 769 - 780.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部