期刊文献+

基于IBC策略驱动的组播内容分发方案

IBC-based policy-driven multicast content distribution scheme
下载PDF
导出
摘要 针对内容分发应用中的组播加密方案和多接收者加密方案所存在的动态组密钥管理复杂、计算和通信代价高等问题,分析了内容分发系统的典型安全需求,采用基于身份密码学提出了一种新的面向群组的安全内容分发系统模型与方案,经安全性与性能分析表明,方案满足接收方访问控制、发送方鉴别与防抵赖、策略加密等安全要求。将发送方的计算和通信代价降为O(1),同时具有密钥管理简单、组密钥更新开销小和易于实现等特点,能方便地应用于商业的组播内容分发系统。 The multicast encryption and multi-recipient encryption schemes used in content distribution applications encounter some common problems,such as heavy key management for dynamic groups,high computation and communication costs,etc.Exploits identity-based cryptography is exploited to propose a new group-oriented secure content distribution model and scheme based on security requirements for practical application.The analyses on security and performance show that the scheme meets many essential requirements which include receiver access control,source authentication and non-repudiation,policy-driven encryption,has a O(1) computation and communication cost for sender,and owns properties such as simple group key management,low cost of group key update,ease for implementation.It can be used to deploy a commercial multicast content distribution system.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2010年第12期2707-2710,共4页 Systems Engineering and Electronics
基金 国家863软件重大应用示范项目(2004AA1Z2502)资助课题
关键词 内容分发 组播 基于身份密码学 组密钥管理 策略驱动 content distribution multicast identity based cryptography group key management policy-driven
  • 相关文献

参考文献17

  • 1Almeroth K C,Ammar M H.Multicast group behavior in the Internet' s multicast backbone(MBone)[J].IEEE Communications Magazine,1997,35(6),124-129.
  • 2Banerjee S.Bhattacharjee B,Kommareddy C.Scalable application layer multicast[C] //Proc.of ACM Special Interest Group of Communication,2002:205-217.
  • 3Hanerjee S,Kommareddy C,Kar K,et al.Construction of an efficient overlay multicast infrastructure for realtime applications[C] //Proc.of IEEE International Conference on Computer Communication,2003,1521-1531.
  • 4Judge P,Ammar M.Security issues and solutions in multicast content distribution,a survey[J].IEEE Network,2003,17(1):30-36.
  • 5Rafaeli S,Hutchison D.A survey of key management for secure group communication[J].ACM Computing Surveys,2003,35(3):309-329.
  • 6Wallner D,Harder E,Agee R.Key management for multicast:issues and architectures[EB/OL].[2010-02-05].http://www.ietf.org/rfc/rfc2627.txt.
  • 7Wong C K,Gouda M,Lam S S.Secure group communication using key graphs[J].IEEE/ACM Trans.on Networking,2000,8(1):16-30.
  • 8Canetti R,Garay J,Itkls G,et al.Multicast security:a taxonomy and some efficient construction[C] //Proc.of IEEE International Conference on Computer Communication,1999:708-716.
  • 9Perrig A,Song D,Tygar J D.ELK,a new protocol for efficient large group key distribution[C] //Proc.of IEEE Symposium on Security and Privacy,2001:247-262.
  • 10Shamir A.Identity-based cryptosystems and signature schemes[C] //Proc.of CRYPTO on Advances in Cryptology,1985:47-53.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部