期刊文献+

一个安全有效的会议密钥分配方案 被引量:1

A Secure and Efficient Conference Key Distribution Scheme
下载PDF
导出
摘要 指出了M .Steiner等人提出的会议密钥分配方案GDH .2存在的安全漏洞 ,并提出一个新的安全有效的会议密钥分配方案 ,该方案适合多个用户通过不安全的通信网络进行信息交流。相对于GDH .2而言 ,本方案只以增加很小的计算量和通信负荷为代价 。 A security flaw in the conference distribution scheme, namely GDH.2, proposed by M. Steiner et al , is found out, and a new secure and efficient conference key distribution scheme suitable for users exchanging information on insecure communication networks. Compared with GDH.2, the security of this new scheme is greatly improved at the cost of a slight increase in computation and communication loads.
作者 袁丁 范平志
出处 《西南交通大学学报》 EI CSCD 北大核心 2002年第4期408-412,共5页 Journal of Southwest Jiaotong University
基金 国家自然科学基金 (6 982 5 10 2 )
关键词 会议密钥分配方案 计算机网络 会议密钥分配协议 HASH函数 GDH.2协议 密码学 数据加密 safety computer networks conference key hash function
  • 相关文献

参考文献10

  • 1[1]Kenji K.Secure conference key distribution schemes for conspiracy[A].In Advance in Cryptology-Eurocrypt[C].Springer-verlag,Berlin Germany,1992:449-454.
  • 2[2]Hwang M S,Yang W P.Conference key distribution protocols for digital mobile communication system[J].IEEE J.Select.Areas Comm.1995;13(2):416-420 .
  • 3[3]Burmester M,Desmedt Y.A secure and efficient conference key distribution system[A].In Advance in Cryptology-Eurocrypt[C].Springer-verlag,Berlin Germany,1994:275-287.
  • 4[4]Burmester M,Desmedt Y.Efficient and secure conference key distribution[A].In Combridge Workshop on Security Protocols,Volume 1189 of Lecture Notes in Computer Science[C].Springer-verlag,Berlin Germany,1996;4:119-129.
  • 5[5]Steiner M,Tsudik G,Waidrer M.Diffie-Hellman key distribution extended to groups[A].In ACM Conference Computer and Communication Security[C].California:ACM Press,1996;3:31-37.
  • 6[6]Steiner M,Tsudik G,Waidrer M.CLIQUES:A new approach to group key agreement[A].In IEEE International Conference on Distributed Computing System,Amsterdam[C].The Netherlands,1998;3:168-176.
  • 7[7]Ateniese G,Steiner M ,Tsudik G.Authenticated group key agreement and friends[A].In Proceedings of the 5th ACM Conference on Computer and Communication Security[C].San Francisco,CA,1998;11:164-174.
  • 8[8]Diffie W,Hellman M.New directions in cryptography[J].IEEE Trans.on Information Theory,1976;IT-22(6):644-654.
  • 9[9]Gong L.A security risk of depending on synchronized clocks[J].ACM Operating System Rev.,1992;26(1):49-53.
  • 10[10]Mills D L.Internet time synchronization:the network time protocol[J].IEEE Trans.Comm.,1991;39(10):1 482-1 493.

同被引文献6

  • 1Steiner M, Tsudik G, Waidrer M. Diffie - Hellman key distribution extended to groups[ A]. In ACM conference computer and communication security[C]. California. ACM Press, Mar. 1996. 31-37.
  • 2Koyama K. Secure conference key distribution schemes for conspiracy[ A]. advance in Cryptology - Eurecrypt[ C]. Springer - verlag,Berlin Germany, 1992. 449 -454.
  • 3Hwang MS, Yang WP. Conference key distribution protocols for digital mobile communication system [ J]. IEEE J. Select. Areas Comm., 1995, 13(2) :416 -420.
  • 4Burmester M , Desmedt Y . A secure and efficient conference key distribution system [ A]. advance in Cryptology - Eurocrypt [ C].Springer-verlag. Berlin Germany, 1994. 275-287.
  • 5Burmester M, Desmedt Y. Efficient and secure confeaence key distribution[ A]. In Combridge Workshop on security protecols, volume 1189 of lecture Notes in computer science[ C]. Springer -verlag,Berlin Germany, Apr. 1996. 119 -129.
  • 6Schneier B 吴世忠 译.应用密码学-协议、算法与C源程序[M].北京:机械工业出版社,2000..

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部