期刊文献+

普适环境中基于身份的组密钥管理方案 被引量:1

Identity-based group key management scheme in pervasive computing environment
下载PDF
导出
摘要 分析了普适环境中组密钥管理方案的需求,结合基于身份的公钥密码技术和STR组密协商协议,设计了一种新的基于身份的可认证组密钥管理方案。针对普适环境中节点随时加入和退出群组的特点,设计了组密钥更新协议,保证了组密钥的前向和后向安全性。方案在满足安全性要求的前提下,具有较小的计算和通信开销。 The requirements of group key management scheme in pervasive environment were analyzed.A new identity-based group key management scheme was proposed by combing the identity-based cryptography and STR protocol.Concerning nodes' free joining and leaving the group,group key renewing protocol was proposed,which could guarantee the forward security and backward security of the group key.The scheme can achieve security requirements and has less computation and communications load.
出处 《计算机应用》 CSCD 北大核心 2011年第4期981-983,共3页 journal of Computer Applications
关键词 普适环境 组播 组密钥管理 基于身份的密钥体制 STR协议 pervasive environment multicast group key management identity-based cryptography STR protocol
  • 相关文献

参考文献7

  • 1YANG F, CAI H B, CAO Q Y. BAPUC: A broadcast authentica- tion protocol for ubiquitous computing[ C ]// 2008 IEEE Conference on Industrial Electronics and Applications. New York: IEEE, 2008:2560 - 2564.
  • 2KIM S, AHN T, HEEKUCK O. An efficient hierarchical group key management protocol for a ubiquitous computing environment[ C ]// ICCSA 2006, LNCS 3983. Berlin: Springer, 2006:388-395.
  • 3STEINER M, TSUDIK G, WAIDNER M. Key agreement in dynamic peer groups[ J ]. IEEE Transactions on Parallel and Distributed System, 2000, 11(8) : 760-780.
  • 4KIM Y, PERRG A, TSUDIK G. Group key agreement efficient in communication[ J ]. IEEE Transactions on Computers, 2004, 53 (7) : 905-921.
  • 5KIM Y, PERRG A, TSUDIK G. Tree-based group key agreement [ J ]. ACM Transactions on Information and System Security, 2004, 7(1):60-96.
  • 6宋震,周贤伟,窦文华.一种基于身份标识的MANET组密钥协商协议[J].电子学报,2008,36(10):1862-1868. 被引量:6
  • 7周福才,徐剑,徐海芳,刘泽超.Ad hoc网络中基于双线性配对的STR组密钥管理协议研究[J].通信学报,2008,29(10):117-125. 被引量:13

二级参考文献21

  • 1杨德明,慕德俊,许钟.Ad hoc空间网络密钥管理与认证方案[J].通信学报,2006,27(8):104-107. 被引量:17
  • 2ZHOU Fucai XU Jian LI Ting.Cost of Multicast Logical Key Tree Based on Hierarchical Data Processing[J].Wuhan University Journal of Natural Sciences,2006,11(5):1172-1176. 被引量:2
  • 3周福才,林龙,王金营,徐剑.没有SDC的(t,n)门限秘密共享方案[J].通信学报,2006,27(10):69-73. 被引量:2
  • 4BURMESTER M, DESMEDT Y. A secure and efficient coference key distribution system [A]. proceedings of Eurocrypt 1994[C]. Perugia, Italy, 1994. 275-286.
  • 5STENIER M, TSUDIK G. WAIDNER M, Diffie-Hellman key distribution extended to group communication[A]. ACM Conference on Computer and Comrntmications Secutity[C]. New Delhi, India, 1996. 31-37.
  • 6KIM Y, PERRG A, TSUDIK G Tree-based group Diffie-Hellman protocol[J]. ACM Transactions on Information and System Security,2004,7 ( 1 ):60-96.
  • 7SANGWON L, YONGDAE K, KWANGJO K, et al. An efficient tree-based group key agreement using bilinear map[A]. ACNS2003[C]. Kunming, 2003.357-371.
  • 8KIM Y, PERRIG A, TSUDIK G. Simple and fault-tolerant key agreement for dynamic collaborative groups[A]. ACM CCS 2000[C]. Athens, Greece, 2000.235-244.
  • 9STEER D, STRAWCZYNSKI L, DIFFIE W, et al. A secure audio teleconference system[A]. Proceedings of CRYPT '88[C]. Santa Barbara, CA, USA, 1988.520-528.
  • 10KIM Y, PERRIG A, TSUDIK G. Communication-efficient group key agreement[A]. Proceedings of IFIPSEC 2001[C]. Heidelberg, Germany.2001.229-244.

共引文献16

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部