期刊文献+

一种改进的会议密钥分配方案

Improved Conference Key Distribution Scheme
下载PDF
导出
摘要 基于Diffie-Hellman公钥分配体系和密封锁,给出一种改进的会议密钥分配方案。理论分析证明,该方案能够保证组成员的匿名性,防止被动攻击、重放攻击、伪造攻击,具有良好的可扩展性,并且组成员可以验证自己是否被邀请参加当前会议。与同类方案相比,该方案的密钥分配过程和恢复过程的计算量更小。 Based on Diffie-I-Iellman public key distribution system and a sealed lock, this paper proposes an improved conference key distribution scheme. Theory analysis proves that the scheme has good scalability, provides anonymity of the conference group members, and can prevent passive attacks, replay attacks and forgery attacks. With the scheme, the group members can verify if they are invited to attend the conference. Compared with the previous schemes, the scheme is less computational.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第22期122-124,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60963024) 广西自然科学基金资助项目(桂科青0991079) 桂林电子科技大学基金资助项目(UF08014Y)
关键词 会议密钥 密封锁 Diffie—Hellman公钥分配体系 匿名性 conference key sealed lock Diffie-Helhnan public key distribution system anonymity
  • 相关文献

参考文献7

  • 1Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
  • 2lngemarsson I, Tang D T, Wong C K. A Conference Key Distribution System[J]. IEEE Transactions on Information Theory, 1982, 28(5): 714-720.
  • 3Lu Erl-Huei, Hwang Wen-Yie, Ham L. A Conference Key Distribution System Based on the Lagrange Interpolating Polynomial[C]//Proceedings of IEEE Annual Joint Conference of Computer and Communication Society. Louisiana, USA: IEEE Press, 1988: 1092-1094.
  • 4Chang Chin-Chen, Lin Chu-Hsing, Chen Chien-Yuan. A Conference Key Distribution Scheme Using Interpolynomials[C]//Proceedings of International Conference on Multimedia and Ubiquitious Engineering. Seoul, Korea: IEEE Computer Society, 2007: 963-967.
  • 5王靖,李秀莹,杨成.基于身份的密封锁会议密钥分配协议[J].计算机工程,2009,35(14):163-165. 被引量:1
  • 6Tseng Yuh-Min. A Communication-efficient and Fault-tolerant Conference-key Agreement Protocol with Forward Secrecy[J]. Journal of Systems and Software, 2007, 80(7): 1091-1101.
  • 7Jung Bae-Eun. An Efficient Group Key Agreement. Protocol[J]. IEEE Communications Letters, 2006, 10(2): 106-107.

二级参考文献6

  • 1Lin Chu-Hsing,Chang Chin-Chen,Lee R C T.A Conference Key Broadcasting System Using Sealed Locks[J].Information Systems,1992,17(4):323-328.
  • 2Shamir A.Identity-based Cryptosystems and Signature Schemes[C]// Proc.of CRYPTO'84.Santa Barbara,California,USA:[s.n.],1984.
  • 3Tseng Yuh-Min,Jan Jinn-Ke.Anonymous Conference Key Distribution Systems Based on the Discrete Logarithm Problem[J].Computer Communications,1999,22(8):749-754.
  • 4Yang Chou-Chen,Hwang Min-Shiang,Chang Ting-Yi.A New Anonymous Conference Key Distribution System Based on the Elliptic Curve Discrete Logarithm Problem[J].Computer Standards and Interfaces,2003,25(2):141-145.
  • 5Wu T C.Conference Key Distribution System with User Anonymity Based on Algebraic Approach[J].IEE Proc.of Computers and Digital Techniques,1997,144(2):145-148.
  • 6Li Shiqun,Chen Kefei,Li Xiangxue.Identity-based Conference Key Distribution Scheme from Parings[C]//Proc.of ICCNMC'05.Zhangjiajie,China:[s.n.],2005.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部