期刊文献+

一种改进的组播密钥管理方案 被引量:2

Improved Multicast Key Management Scheme
下载PDF
导出
摘要 针对现有组播密钥管理方案存在的前向加密、后向加密和同谋破解问题,提出一种改进的组播密钥管理方案。改进方案由组播认证、安全组播转发树的维护、组密钥的分发和更新组成,通过二层控制方式降低组成员离开时密钥更新操作的复杂度,从而保障组密钥分发和更新过程的安全性和高效性。实验结果表明,改进方案具有较优越的计算开销、通信开销和可接受的存储开销。 Aiming at the problems that multicast key management scheme exists forward confidentiality,backward confidentiality and conspiracy cracked,this paper presents an improved multicast key management scheme.It includes multicast authentication,secure multicast forwarding tree management,key distribution when users are initialized and periodical key updating.It reduces the complexity of the key updating problem when members leave the group by two-layer control and guarantee the efficiency and security of key management.Experimental result shows that this scheme performs better on computation cost and communication cost,and it has acceptable storage cost.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第5期140-142,共3页 Computer Engineering
基金 国家科技支撑计划基金资助项目"新一代可信任互联网安全和网络服务"(2008BAH37B04) 江苏省科技支撑计划基金资助项目"新一代互联网大规模组播关键技术的研究与试验"(SBE200800789)
关键词 组播密钥管理 二层控制 简单网络管理协议 multicast key management two-layer control Simple Network Management Protocol(SNMP)
  • 相关文献

参考文献5

二级参考文献35

  • 1张兴明.大规模接入汇聚路由器(ACR)技术[z].(2005-03-15).http://www.redlib.cn/html/DianShiJiShu_13181/ZMClliIP25921156.htm.
  • 2杨昆.可控组播技术[Z].(2004-02-27).http://www.huawei.com/cn/products/datacomm/pdf/view.do?f=254.
  • 3Gupta P. Routing Lookups in Hardware at Memory Access Speeds[C]//Proc. of the 17th Annual Joint Conf. of Computer and Communications Societies. San Francisco, USA: [s. n.], 1998.
  • 4[1]Deering S. Host extensions for IP multicasting. IETF RFC1112, 1989.
  • 5[2]Quinn B, Almeroth K. IP multicast applications: Challenges and solutions. IETF RFC 3170, 2001.
  • 6[3]Fenner W. Internet group management protocol, version 2. IETF RFC2236, 1997.
  • 7[4]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol, version 3. IETF RFC3376, 2002.
  • 8[5]Krusus PS, Macker JP. Techniques and issues in multicast security. In: Proceedings of the Military Communications Conference. Boston, 1998. 1028~1032.
  • 9[6]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, 2000.
  • 10[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. In: Proceedings of the IEEE INFOCOM 2001. Anchorage, 2001. 422~431.

共引文献79

同被引文献17

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部