期刊文献+

可扩展的P2PSIP会议密钥管理协议 被引量:1

Scalable P2PSIP conference key management scheme
下载PDF
导出
摘要 针对P2PSIP多媒体会议低延时、高扩展性需求,提出一种分级的会议密钥管理协议HOAKA。根据处理能力将会议节点分成两级,由少量高性能节点负责会议管理,所有成员通过单向累加器算法协商会议密钥。研究结果表明,HOAKA不仅具有较高的安全性,而且计算、存储开销低,密钥更新时延小,具有良好的可扩展性。 In order to meet the requirements of low latency and high scalability for P2PSIP conference, this paper proposed a hierarchical conference key management protoeol-HOAKA. In HOAKA, conference nodes were divided into two classes according to their capabilities, a small amount of high-performance nodes managed the conference, and all the conferees agreed on a conference key by using one-way accumulator. The results show that HOAKA has not only high security, but also low computing and storage overhead as well as small 1/ey update delay. It has good scalability.
作者 施苑英
出处 《计算机应用研究》 CSCD 北大核心 2012年第3期1063-1065,共3页 Application Research of Computers
基金 西安邮电学院中青年科研基金资助项目(ZL2010-13)
关键词 对等会话初始化协议 会议密钥 单向累加器 可扩展性 P2PSIP conference key one-way accumulator scalability
  • 相关文献

参考文献10

  • 1SINGH K, SCHULZRINNE H. Peer-to-peer Internet telephony using SIP[ C]//Proc of International Workshop on Network and Operating Systems Support for Digital Audio and Video. New York:ACM Press, 2005:63- 68.
  • 2JENNINGS C, LOWEKAMP B, RESCORLA E, et al. Resource loca- tion and discovery (RELOAD) [ EB/OL]. (2008-02-24) [2010-09- 12 ]. http ://tools. ietf. org/html/draft-bryan-p2psip-reload-03.
  • 3ROSENBERG J, SCHULZRINNE H, CAMARILLO G,et al. RFC 3261, SIP: session initiation protocol [ S ]. [ S. 1. ] : IETF, 2002.
  • 4SONG H, MATUSZEWSKI M, YORK D. P2PSIP security overview and risk analysis [ EB/OL ]. ( 2009-09-28 ) [ 2010-01-11 ]. http ://tools. ietf. org/id/draft-matuszewski-p2psip-security-requirements-06, txt.
  • 5CHALLAL Y, SEBA H. Group key management protocols: a novel taxonomy[ J]. International Journal of Information Technology, 2005,2(1) :105-118.
  • 6WANG Yao,ZHANG Chun-hong, MA Tao, et al. Design and evalua- tion of reliability mechanisms in P2PSIP-based conference system [ C ]//Proc of the 4th International Conference on Wireless Communi- cations, Networking and Mobile Computing. Washington DE: IEEE Press, 2008: 3261-3266.
  • 7BARIC N, PFITZMANN B. Collision-free accumulators and fail-stop signature schemes without trees[ C ]//Proc of EUROCRYPT'97. Ber- lin: Springer-Verlag, 1997: 480-494.
  • 8RING J, CHOO K-K R, FOO E, et al. A new authentication mecha- nism and key agreement protocol for SIP using identity-based crypto- graphy [ C ]//Proc of AusCERT Asia Pacific Information Technology Security Conference. Brisbane: University of Queensland Publicatian, 2006.57 - 72.
  • 9施苑英.一种高效的P2PSIP认证与密钥协商机制[J].计算机应用研究,2011,28(1):234-236. 被引量:2
  • 10FANDRIANTO A. SIPDHT: an open source project for P2PSIP[ EB/ OL]. (2007-07) [ 2010-10-02 ]. http://sipdht, sourceforge, net/ sipdht2/report-fandrianto-sipdht2, pdf.

二级参考文献10

  • 1ROSENBERG J, SCHULZRINNE H, CAMARILLO G, et al.RFC 3261, SIP: session initiation protocol[S].2002.
  • 2SINGH K, SCHULZRINNE H.Peer-to-peer Internet telephony using SIP[C]//Proc of International Workshop on Network and Operating Systems Support for Digital Audio and Video.New York:ACM Press, 2005:63-68.
  • 3SCHOLLMEIER R.A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications[C]//Proc of the 1st International Conference on Peer-to-Peer Computing.Washington DC: IEEE Computer Society, 2001:101-102.
  • 4SONGHai-bin,MATUSZEWSKIM,YORKD.P2PSIPsecurityoverviewandriskanalysis[EB/OL].(2009-09-28)[2010-01-11].http://tools.ietf.org/id/draft-matuszewski-p2psip-security-requirements-06.txt.
  • 5JAMPATHOM C.P2PSIP security[D].Espoo:Helsinki University of Technology, 2008.
  • 6WANG Feng-jiao, ZHANG Yu-qing.A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography[J].Computer Communications, 2008, 30(10):2142-2149.
  • 7STINSON D R, WU Jiang. A zero-knowledge identification and key agreement protocol [EB/OL ]. ( 2007- 07- 18 ) [ 2010- 03- 12 ]. http ://epfint. iacr. org/2007/116. pdf.
  • 8SCHNORR C P.Efficient identifications and signatures for smart cards[C]//Proc of the 9th Annual International Cryptology Conference on Advances in Cryptology.London: Springer-Verlag, 1990:239-252.
  • 9BAEK J, SAFAVI-NAINI R, SUSILO W.Certificateless public key encryption without pairing[C]//Proc of the 8th International Confe-rence on Information Security.Berlin: Springer, 2005:134-148.
  • 10张睿,蒋华,杨亚涛.一种基于SGC-PKE的P2PSIP可认证密钥协商方案[J].北京电子科技学院学报,2008,16(4):49-55. 被引量:4

共引文献1

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部