期刊文献+

基于秘密共享的组播密钥更新算法

Group Re-keying Algorithm Based on Secret Sharing
下载PDF
导出
摘要 提出一种基于秘密共享的组播密钥更新算法。采用二叉逻辑密钥树结构,根据组成员状态变化,利用秘密共享的思想构造广播消息,使组成员可以逐步计算组密钥,而非组成员不能计算组密钥,从而实现组密钥更新。分析表明,与采用逻辑密钥树的算法相比,该算法能降低密钥更新时的通信量和计算量,适用于大型的动态群组通信。 The ideas of group re-keying algorithms based on secret sharing using the LKH tree are proposed in this paper. The algorithms construct a message using secret sharing with the dynamic change of group members. The group members can reconstruct the new group key. It is proved that the new algorithms have obvious superiority than that of the previously proposed algorithms on communication and computation, and are suitable for large dynamic group.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第21期149-151,共3页 Computer Engineering
关键词 组密钥管理 秘密共享 密钥树 密钥更新 group key management secret sharing key tree re-keying
  • 相关文献

参考文献7

  • 1Wanner D,Harder E,Agee R.Key Management for Multicast: Issues and Architectures[S].RFC 2627,1999.
  • 2Wong K,Gouda M,Lam S.Secure Group Communications Using Key Graphs[J].IEEE/ACM Trans.on Networking.2000,8(1):16-30.
  • 3Sherman A,McGrew D.Key Establishment in Large Dynamic Groups Using One-way Function Trees[J].IEEE Trans.on Software Engineering.2003,29(5):444-458.
  • 4朱文涛,熊继平,李津生,洪佩琳.安全组播中密钥分配问题的研究[J].软件学报,2003,14(12):2052-2059. 被引量:18
  • 5Staddon J,Miner S,Franklin M,et al.Self-healing Key Distribution with Revocation[C]//Proc.of IEEE Symposium on Security and Privacy.Berkeley,California,USA: IEEE Press,2002: 224-240.
  • 6Yang Ming.An Unconditionally Secure Multi-round Revocation Scheme Using Secret Sharing[C]//Proc.of CCN’02.Marina Del Rey,California,USA: [s.n],2005: 31-37.
  • 7陈礼青,张福泰.基于门限秘密共享的动态安全组播密钥协商[J].计算机工程,2008,34(1):147-149. 被引量:3

二级参考文献25

  • 1[1]Deering S. Host extensions for IP multicasting. IETF RFC1112, 1989.
  • 2[2]Quinn B, Almeroth K. IP multicast applications: Challenges and solutions. IETF RFC 3170, 2001.
  • 3[3]Fenner W. Internet group management protocol, version 2. IETF RFC2236, 1997.
  • 4[4]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol, version 3. IETF RFC3376, 2002.
  • 5[5]Krusus PS, Macker JP. Techniques and issues in multicast security. In: Proceedings of the Military Communications Conference. Boston, 1998. 1028~1032.
  • 6[6]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, 2000.
  • 7[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. In: Proceedings of the IEEE INFOCOM 2001. Anchorage, 2001. 422~431.
  • 8[8]Tanaka S, Sato F. A key distribution and rekeying framework with totally ordered multicast protocols. In: Proceedings of the 15th International Conference on Information Networking. Beppu City, 2001. 831~838.
  • 9[9]Li M, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint. IEEE Communications Letters, 2000,6(3):108~110.
  • 10[10]Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2001,47(7):2824~2834.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部