期刊文献+

组播密钥管理的研究进展 被引量:66

A Survey of Research on Key Management for Multicast
下载PDF
导出
摘要 缺乏安全机制限制了组播在各种网络业务中的应用.组播密钥管理通过为组播成员生成、发送和更新组密钥来满足加密认证等安全需求.组播密钥管理方案的设计,除了要满足基本的安全需求,还要兼顾可扩展性、健壮性、可靠性等多方面因素.分析了组播密钥管理所面临的问题,并通过对已有的几种组播密钥树方案的介绍,探讨和总结了组播密钥管理的研究现状和发展趋势. The absence of security mechanism has limited the use of multicast. Key management for multicast is used for group members in one multicast session to generate, refresh and transfer keys which are used for encryption and authentication. In addition to the maintenance of keys, issues about scalability, reliability and robustness should be carefully considered. In this paper, the existing problems in key management for multicast are analyzed, and some typical schemes are reviewed.
出处 《软件学报》 EI CSCD 北大核心 2004年第1期141-150,共10页 Journal of Software
基金 国家自然科学基金 国家高技术研究发展计划(863) 国家教育部科学技术重点项目~~
关键词 组播 密钥管理 逻辑密钥树 IP multicast key management logical key tree
  • 相关文献

参考文献15

  • 1[1]Harney H, Muckenhirn C. Group key management protocol (GKMP) specification. RFC2093, 1997.
  • 2[2]Harney H, Muckenhirn C. Group key management protocol (GKMP) architecture. RFC2094, 1997.
  • 3[3]Setiner M, Taudik G, Waidnet M. Cliques: A new approach to group key agreement. Technical Report, RZ 2984, IBM Research, 1997.
  • 4[4]Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,IT-22(6):644~654.
  • 5[5]Mittra S. Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM Computer Communication Review, Volume 27, Issue 4. New York: ACM Press, 1997. 277~288.
  • 6[6]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architec-tures. RFC 2627, 1999.
  • 7[7]Waldvogel M, Garonni G, Sun D, Weiler N, Plattner B. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications (Special Issue on Middleware), 1999,17(9):1614~1631.
  • 8[8]Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: One-Way function trees and amortized initialization. IETF Internet Draft (work in progress), 2000.
  • 9[9]Canetti R, Caray J, Itkis G, Micciancio D, Naorr M, Pinkas B. Multicast security: A taxonomy and some efficient constructions. In: Proc. of the INFOCOM'99. New York, 1999. 708~716.
  • 10[10]Yang L, Li XS, Zhang XB, Lam SS. Reliable group rekeying: A performance analysis. In: ACM SIGCOMM 2001. San Diego, 2001. 27~31.

同被引文献410

引证文献66

二级引证文献103

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部