期刊文献+

QKD网络中组密钥协商的研究 被引量:1

RESEARCH ON GROUP KEY AGREEMENT IN QKD NETWORKS
下载PDF
导出
摘要 传统组密钥协商方法很难满足QKD(Quantum Key Distribution)网络的实用需求。针对这种情况,提出一种适用于多种QKD网络结构的复合式量子组密钥协商方案。该方案将不同结构的QKD网络归为统一的形式,充分利用密钥缓存池中的密钥,在经典信道上完成安全协商过程,最终参与组播通信的QKD设备都能获得一致的组密钥,并将这些密钥分发给用户。与几种传统组密钥协商方案对比,该方案具有很好的安全性和可扩展性,并在绝大数应用环境下具有很高的效率。 Traditional group key agreement methods are hard to meet the practical needs of QKD networks. In view of this, we propose a group key agreement scheme with composite quantum group which is applicable to a variety of QKD networks structures. The scheme classifies QKD networks with different structures to a unified form, and makes full use of the keys in key buffer pool, accomplishes the security negotiation process on the classical channel. Eventually, all the QKD devices participated in the multicast communication can obtain same group keys, and distribute these group keys to users. Compared with several traditional group key agreement schemes, our scheme has good security and scalability, and has high efficiency in most application environments as well.
出处 《计算机应用与软件》 CSCD 2015年第5期267-269,301,共4页 Computer Applications and Software
基金 "十二五"国防预研背景项目(10501020302) 国家科技重大专项(2012zx01027004)
关键词 组密钥协商 QKD(quantum KEY distribution)网络 联通图 缓存池 Group key agreement QKD (quantum key distribution) networks Unicorn figure Buffer pool
  • 相关文献

参考文献13

  • 1Patrick P, John C, David K. Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups [ C ]//Computer Science Technical Reports,2002:2 - 15.
  • 2Yongdae K, Adrian P, Gene T. Group Key Agreement Efficient in Com- municationE C ]//IEEE Transactions on Compute~ ,2003 : 19 - 57.
  • 3张江,张萌,陈春晓,杨士强.高效的分布式组密钥协商机制[J].清华大学学报(自然科学版),2008,48(1):101-105. 被引量:5
  • 4张玉臣,王亚弟,韩继红,范钰丹.自组网环境下基于组合公钥的分布式密钥管理[J].计算机科学,2011,38(10):75-77. 被引量:4
  • 5赵秀凤,徐秋亮,韦大伟.群组密钥协商协议的安全性分析方法研究[J].计算机科学,2011,38(6):145-148. 被引量:4
  • 6陈卫东,刘广伟,刘泽超,张斌,周福才.分布式组播密钥管理协议中的组密钥生成算法研究[J].小型微型计算机系统,2010,31(7):1307-1310. 被引量:3
  • 7刘成林,徐秋亮.基于身份的多安全群组密钥协商协议[C]∥济南:第九届中国密码学学术会议论文集.2006.
  • 8Varalakshmi R, Uthariaraj V R. A New Secure Muhicast Group Key Management Using Group Code [ C ~//ICRTIT,2011:378 - 387.
  • 9Allam A M ,Abbas H M. Group Key Exchange Using Neural Cryptogra- phy With Binary Trees [ C ]//IEEE,2011 : 1028 - 1039.
  • 10Lee P P,Lui J C, Yau D K. Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups [ J ]. Computer Science Technical Reports,2002,16 (3) : 1531 - 1542.

二级参考文献45

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2李彦希,赵耀,林闯,尹浩,蒋屹新.基于单向函数树的高效分布式组密钥管理方案[J].清华大学学报(自然科学版),2005,45(10):1417-1420. 被引量:6
  • 3Paul D T. Quantum cryptography on optical fiber net- works [J]. Optical Fiber Technology, 1998,(4):345- 370.
  • 4Chip E, Alexander C, Davin P, et al. Current status of the DARPA quantum network [C]. Cambridge, Massachusetts: SPIE, 2005. 5815:138-149.
  • 5Mehrdad D, Romain A. Architecture of the Secoqc quantum key distribution Network [EB/OL]. arxiv. org/abs/quant-ph/0610202, 2006-10-25.
  • 6Poppe A, Peev M, Maurhart O, et al. Outline of the Secoqc quantum-key distribution network in Vienna [EB/OL]. arxiv, org/pdf/0804. 0122v1, 2008-04-01.
  • 7Kumavor D P, Beal C A. Yelin S, et al. Comparison of four multi-user quantum key distribution schemes over passive optical networks [J]. Journal of Lightwave Technology, 2005,23 (1) : 268-276.
  • 8Goldwasser S, Mieali S. Probabilistic encryption [J]. Journal of Computer and System Science, 1984,28 : 270-299.
  • 9Bellare M, Rogaway P. Entity authentication and key exchange [C]//Stinson D R, ed. Proc. of the Advances in Cryptology- Crypto' 93. LNCS 773. Berlin, Heidelberg, Springer-Verlag, 1993,232-249.
  • 10Dolev D, Yao A C-C. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29 (2) : 198- 207.

共引文献14

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部