期刊文献+

安全组播来源认证性能分析

Analysis of Secure Multicast Source Authentication Performance
下载PDF
导出
摘要 组播技术可以为群组成员提供安全高效的群组通讯,出于安全需要对来源进行认证,来源认证的性能直接影响组播方案的性能。文章讨论了组播系统的安全性,对密钥管理方案进行了讨论,分析了Cannetti等人提出的利用MAC概念的组播来源的认证方法,并对该方法的性能进行了定量分析。分析结果对于评价安全组播来源认证方法的性能具有一定的参考意义。 Multicast technology can provide a safe and an efficient group communications for its members out of the security need.The performance of source certification impacts directly the multicast schema.In this paper,the security of multicast system and the management scheme of key have been discussed,a multicast source authentication method based on MAC concept proposed by Cannetti etc.has been analysised and it's performance has been quantitatively analysised at the same time.The analysis result has certain reference significance for the performance evaluation of the security multicast source authentication method.
出处 《四川理工学院学报(自然科学版)》 CAS 2010年第5期539-542,共4页 Journal of Sichuan University of Science & Engineering(Natural Science Edition)
基金 四川省科技厅支撑项目(2009JY0134) 四川省人工智能(高校)重点实验室项目(2009RY005)
关键词 安全组播 来源认证 密钥管理 性能分析 secure multicast authentication key management performance analysis
  • 相关文献

参考文献12

  • 1徐明伟,董晓虎,徐恪.组播密钥管理的研究进展[J].软件学报,2004,15(1):141-150. 被引量:66
  • 2Noubir G, Zhu F,Chan A H.Key management for simultaneous join/leave in secure multicast[C].Proc.of IEEE Intemational Symposium on Information Theory,2002: 325 -325.
  • 3Chan Kin-Ching,Chan S H G.Distn'buted servers approach for large-scale secure multicast[J].IEEE Journal on Selected Areas in Communications, 2002, 20: 1500- 1510.
  • 4Mittra S.Iolus :A framework for scalable secure multicasting[C].Proc of ACM Conferenceon Communications, Architecture,and Protocols,1997 277-288.
  • 5Refik Molva,Alain Pannetrat.Scalable multicast security with dynamic recipient groups[J].ACM Transactions on Information and System Security,2000,3(8):136-160.
  • 6Briscoe B.MARKS:Zero side-effect multicast key management using arbitrarily revealed key sequences [C]. Proc. of 1st International Workshop on Networked Group Commnication,1999:301-320.
  • 7Canetti R,Garay J,Itkis G, et al.Multicast security:a taxonomy and some efficient constructions [C]. Proc. of IEEE, INFOCOM '99.1999:708-716.
  • 8Li Mingyan,Poovendran R, Berenstein C.Design of secure multicast key management schemes with communication budget constraint[J].IEEE Communications Letters,2002,6:108-110.
  • 9Wallner M,Harder E J,Agee R C.Key management for multicast:Issues and architectures [S].RFC2627,1999-6.
  • 10Steiner M, Tsudik G, Waidner M. Diffie-Hellrmn key distribution extended to group communication [C]. Proc.of 3rd ACM conference on computer and communications security,1996:31-37.

二级参考文献15

  • 1[1]Harney H, Muckenhirn C. Group key management protocol (GKMP) specification. RFC2093, 1997.
  • 2[2]Harney H, Muckenhirn C. Group key management protocol (GKMP) architecture. RFC2094, 1997.
  • 3[3]Setiner M, Taudik G, Waidnet M. Cliques: A new approach to group key agreement. Technical Report, RZ 2984, IBM Research, 1997.
  • 4[4]Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,IT-22(6):644~654.
  • 5[5]Mittra S. Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM Computer Communication Review, Volume 27, Issue 4. New York: ACM Press, 1997. 277~288.
  • 6[6]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architec-tures. RFC 2627, 1999.
  • 7[7]Waldvogel M, Garonni G, Sun D, Weiler N, Plattner B. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications (Special Issue on Middleware), 1999,17(9):1614~1631.
  • 8[8]Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: One-Way function trees and amortized initialization. IETF Internet Draft (work in progress), 2000.
  • 9[9]Canetti R, Caray J, Itkis G, Micciancio D, Naorr M, Pinkas B. Multicast security: A taxonomy and some efficient constructions. In: Proc. of the INFOCOM'99. New York, 1999. 708~716.
  • 10[10]Yang L, Li XS, Zhang XB, Lam SS. Reliable group rekeying: A performance analysis. In: ACM SIGCOMM 2001. San Diego, 2001. 27~31.

共引文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部