期刊文献+

基于ECC的三叉树群组密钥协商方案 被引量:4

TERNARY TREE GROUP KEY AGREEMENT SCHEME BASED ON ECC
下载PDF
导出
摘要 随着互联网的飞速发展,通信工具以及通信方式越来越多。从以前的单点传播发展到现在的组播,例如群组聊天、视频会议等。随着通信工具的普及,通信的安全越来越受到重视。对于安全的群组通信,必须在组成员之间提供消息的完整性、成员身份验证和机密性。为了提供消息的完整性,必须保证群组成员在公共会话密钥协商达成一致,以便对群组通信的数据进行加解密。提出一种高效的群组密钥协商协议。通过基于Diffie Hellman密钥交换协议的椭圆曲线算法(ECC)来支持群组成员加入、离开等操作。采用三叉树来实现群组密钥的生成,并与现有方案进行比较,结果表明,该方案在通信和计算方面具有优势。 With the rapid development of the Internet, there are more and more communication tools and communication methods. They propagate from single point to current multicast, such as group communication, video conference and so on. With the popularization of communication tools, more and more attention has been paid to the security of communication. For secure group communication, message integrity, membership authentication, and confidentiality must be provided between group members. To provide the integrity of the message, the group members must be ensured to agree on a public session key negotiation in order to encrypt and decrypt the data of the group communication. In this paper, we proposed an efficient group key agreement protocol. It supported group members to join and leave by using elliptic curve cryptography(ECC) on the basis of the Diffie Hellman exchange protocol. This protocol employed ternary tree structure in the process of group key generation. Compared with the existing schemes, the protocol has advantages in communication and calculation.
作者 曾继强 史国振 Zeng Jiqiang;Shi Guozhen(School of Telecommunications Engineering,Xidian University,Xi'an 710071,Shaanxi,China;Beijing Electronic Science and Technology Institute,Beijing 100070,China)
出处 《计算机应用与软件》 北大核心 2018年第9期311-316,共6页 Computer Applications and Software
关键词 椭圆曲线算法(ECC) 群组密钥协商 三叉树 Elliptic curve cryptography(ECC) Group key agreement Ternary tree
  • 相关文献

参考文献6

二级参考文献51

  • 1王志伟,谷大武.基于树结构和门限思想的组密钥协商协议[J].软件学报,2004,15(6):924-927. 被引量:11
  • 2余昭平,康斌.基于ECC的高效可认证组密钥协商协议[J].计算机应用,2007,27(5):1033-1034. 被引量:2
  • 3[1]Le V,Guyennet H.IPSec and DNSSEC to support grid application security[C]∥Rana O.Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).Berlin:IEEE Computer Society Press,2002:458-459.
  • 4[2]Rafaeli S,Hutchison D.A survey of key management for secure group communication[J].ACM Computing Surveys,2003,35(3):309-329.
  • 5[3]Stein M,Tsudik G,Waidner M.Key agreement in dynamic peer groups[J].IEEE Trans on Parallel and Distributed Systems,2000,11(8):769-780.
  • 6[4]Caronni G,Waldvogel M,Sun D.Efficient security for large and dynamic groups[C]∥Stanford.Proc the 7th Workshop on Enabling Technologies(WET ICE'98).Washington:IEEE Computer Society Press,1998:376-383.
  • 7[5]Dinsmore P T,Balenson D M,Heyman M.Policy-based security management for large dynamic groups:an overview of the DCCM project[C]∥Hilton H.Proc the DARPA Information Survivability Conference & Exposition.Washington:IEEE Computer Society Press,2000:64-73.
  • 8[6]Mcgrew D A,Sherman A T.Key establishment in large dynamic groups using one-way function trees[J].IEEE Trans on Software Engineering,2003,29(5):444-458.
  • 9Ingemarsson I,Tang D T,Wong C K.A conference key distribution system[J].IEEE Trans 1T,1982,28(5):714-720.
  • 10Steer D,Strawczynski L,Difie W,et al.A secure audio teleconference system[C]// S Goldwasser.Advances in Cryptology'88,LNCS 403.Berlin:Springer-Verlag,1990:520-528.

共引文献4

同被引文献37

引证文献4

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部