期刊文献+

A MULTICAST KEY MANAGEMENT SCHEME BASED ON CHARACTERISTIC VALUES OF MEMBERS 被引量:1

A MULTICAST KEY MANAGEMENT SCHEME BASED ON CHARACTERISTIC VALUES OF MEMBERS
下载PDF
导出
摘要 A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that other group members calculate new keys when a member is joining or leaving is also designed. It achieves forward secrecy and backward secrecy. Compared with typical existing centralized schemes, the storage of Group Key Controller (GKC) in our scheme halves the storage overhead of others, and communication overhead of GKC is 2 in case of joining re-keying. Especially, the leaving re-keying overhead is and the overall performance is excellent. A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that other group members calculate new keys when a member is joining or leaving is also designed. It achieves forward secrecy and backward secrecy. Compared with typical existing centralized schemes, the storage of Group Key Controller (GKC) in our scheme halves the storage overhead of others, and communication overhead of GKC is 2 in case of joining re-keying. Especially, the leaving re-keying overhead is log2 n, and the overall performance is excellent.
出处 《Journal of Electronics(China)》 2012年第3期294-301,共8页 电子科学学刊(英文版)
关键词 Security multicast Key management Characteristic values COLLUSION Re-keying Security multicast Key management Characteristic values Collusion Re-keying
  • 相关文献

参考文献3

二级参考文献43

  • 1[1]Fenner W. Internet group management protocol, Version 2. IETF RFC2236, November 1997.
  • 2[2]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol,Version 3. IETF RFC3376, October 2002.
  • 3[3]Krusus P S, Macker J P. Techniques and issues in multicast security. Military Communications Conference, Boston, USA, 1998, Vol.3: 1028-1032.
  • 4[4]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, http.∥www.securemulticast.org/smug-drafts.htm, August 2000.
  • 5[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) architecture. IETF RFC2094, July 1997.
  • 6[6]Mingyan Li, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint. IEEE Communications Letters, 2002, 6(3): 108-110.
  • 7[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. IEEE INFOCOM 2001, Anchorage, USA, 2001, Vol.1: 422-431.
  • 8[8]Poovendran R, Baras J S. An information-theoretic approach for design and analysis of rootedtree-based multicast key management schemes. IEEE Trans. on Information Theory, 2001, 47(7):2824-2834.
  • 9[9]Guang-Huei Chiou, Wen-Tsuen Chen. Secure broadcasting using the secure lock. IEEE Trans.on Software Engineering, 1989, 15(8): 929-934.
  • 10[10]Kuen-Pin Wu, Shanq-Jang Ruan, Feipei Lai, Chih-Kuang Tseng. On key distribution in secure multicasting. 25th Annual IEEE Conference on Local Computer Networks, Tampa, USA, 2000:208-212.

共引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部