期刊文献+

基于QKD的组密钥服务初始化研究 被引量:1

Research of Group Key Service Initialization Based on QKD
下载PDF
导出
摘要 随着量子密码学领域研究的深入,视频会议、网络游戏、股市交易等动态群组通信模型对量子组密钥提出了应用需求。为了很好地服务这类应用,在分析传统组密钥管理方案的基础上,给出了一种两层分组分布式量子组密钥管理模型,设计了这种模型下的量子组密钥服务协议,重点研究了协议的初始化阶段。与几种经典组密钥管理方案对比,该方案在组密钥生成和共享中效率较高,具有一定的实际意义。 With the deepening of the quantum cryptography field research, video conference, networks games, stock trading and other dynamic group communication models put forward application requirements to quantum group key. In order to service these applications well,on the basis of analyzing the traditional group key manage-ment scheme, present a two layers of packet distributed quantum group key management model, design the quan-tum group key service agreement under this model, focus on the initialization phase of the agreement. Compared with several kinds of classic group key management scheme, this scheme's efficiency is higher in group key gen-eration and sharing, has certain practical significance.
出处 《计算机科学》 CSCD 北大核心 2013年第11A期181-183,213,共4页 Computer Science
基金 "十二五"国防预研背景项目(10501020302)资助
关键词 组密钥 量子密钥分配(QKD) 缓存池 初始化 Group key, Quantum key distribution(QKD), Buffer pool, Initialization
  • 相关文献

参考文献7

二级参考文献40

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2李彦希,赵耀,林闯,尹浩,蒋屹新.基于单向函数树的高效分布式组密钥管理方案[J].清华大学学报(自然科学版),2005,45(10):1417-1420. 被引量:6
  • 3Goldwasser S, Mieali S. Probabilistic encryption [J]. Journal of Computer and System Science, 1984,28 : 270-299.
  • 4Bellare M, Rogaway P. Entity authentication and key exchange [C]//Stinson D R, ed. Proc. of the Advances in Cryptology- Crypto' 93. LNCS 773. Berlin, Heidelberg, Springer-Verlag, 1993,232-249.
  • 5Dolev D, Yao A C-C. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29 (2) : 198- 207.
  • 6Canetti R, Herzog J. Universallly composable symbolic analysis of mutual authentication and key-exchange[C]//Proc of Theory of Cryptography. LNCS 3876,2006. Berlin, Heidelberg: Spring- er-Verlag, 2006 : 380-403.
  • 7中国密码学会.密码协议发展研究[R].2009-2010密码学学科发展报告[D].北京:中国科学技术出版社,2010-04.
  • 8Shoup V. Sequences of Games: A Tool for Taming Complexity in Security Proofs[EB/OL]. Cryptology ePrint Archive, Report 2004/332, http://eprint. iacr. org/2004/332, pdf, 2004.
  • 9Choudary G M, Boyd C, Gonzalez N J M. Modeling key compro- mise impersonation attacks on group key exchange protccols[C]// Jarecki S,Tsudik G. eds. Proc. of PKC 2009. LNCS 5443, Ber- lin, Heidelberg: Springer-Verlag, 2009 : 105-123.
  • 10Goldreich O. Foundations of Cryptography-Basic Tools[M]. vol- ume 1. Cambridge University Press, 2001.

共引文献5

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部