期刊文献+

即时安全通信会议密钥分配方案 被引量:2

Distribution Scheme of An Instant Secure Communication Conference Key
下载PDF
导出
摘要 提出了一个新的安全有效的会议密钥分配方案,该方案适合多个用户通过临时组建的网络实现即时安全通信。相对于GDH.2而言,该方案对通信参与者的身份以及传输数据的完整性进行了验证,而且对最后产生的会议密钥进行了确认,只以增加很小的计算和通信负荷为代价,安全性能就得到了较大的提高。 This paper proposes a new secure and efficient conference distribution scheme that is suitable for exchanging information over a temporary network. Compared with GDH.2, the identity of the participants and the integrality of transmitted data are verified in the scheme, the final conference key is affirmed moreover. Security of the new scheme is greatly improved at a slight cost in computation and communication overheads.
作者 赵旸
出处 《计算机工程》 CAS CSCD 北大核心 2004年第2期64-65,91,共3页 Computer Engineering
基金 国家自然科学基金资助项目(69825102)
关键词 安全 会议密钥 即时通信 Security Conference key Instant communication
  • 相关文献

参考文献5

  • 1[1]Koyama K. Secure Conference Key Distribution Schemes for Conspiracy [C].In Advance in Cryptology-Euroerypt. Berlin Germany:Springer-Verlag, 1992
  • 2[2]Hwang M S,Yang W P.Conference Key Distribution Protocols for Digital Mobile Communication System [J]. IEEE J. Select. Areas Comm, 1995-02,13:416-420
  • 3[3]Burmester M , Desmedt Y. A Secure and Efficient Conference Key Distribution System [C]. In Advance in Cryptology-Eurocrypt. Berlin.Germany: Springer-Verlag, 1994
  • 4[4]Burmester M, Desmedt Y. Efficient and Secure Conference Key Distribution [C]. In Combridge Workshop on Security Protocols,Lecture Notes in Computer Science, Berlin, Germany: Springcr-Verlag.1996-04,1189:119-129
  • 5[5]Steincr M, Tsudik G, Waidrer M.Diffic-Hellman Key Distribution Extended to Groups [C]. In ACM Conference Computer and Communication Security. California: ACM Press, 1996-03

同被引文献9

  • 1BURMESTER M,DESMEDT Y. A secure and efficient conference key distribution system[A].Advance in Cryptology-Eurocrypt[C]. Springer-Verlag,1994,275-287.
  • 2BURMESTER M,DESMEDT Y. Efficient and secure conference key distribution[A].In Cambridge Workshop on Security Protocols,Volume 1189 of lecture notes in computer science[C].Springer-Verlag,1996,119-126.
  • 3KOYAMA K.Secure conference key distribution schemes for conspiracy[A].Advance in Cryptology-Eurocrypt[C].Springer-Verlag,1992:449-454.
  • 4HWANG T,CHEN J L.Indentity-based conference key broadcast system[J].IEE proc-Comput.Digit.Tech.,1994,141(1):57-60.
  • 5王爱英.智能卡技术:IC卡[M]北京:清华大学出版社,200076.
  • 6崔振兴;顾治华.IM安全威胁与XMPP安全机制分析.
  • 7刘云峰,熊淑华.基于XMPP协议的移动即时通信邮件网关设计[J].通信技术,2010,43(1):151-152. 被引量:3
  • 8关磊,周玉洁.基于Android平台的安全TF卡设计[J].信息安全与通信保密,2012,10(12):92-94. 被引量:1
  • 9郁建.PKI应用安全支撑平台研究与构建[J].信息安全与通信保密,2013,11(8):60-62. 被引量:4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部