期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Cost of Multicast Logical Key Tree Based on Hierarchical Data Processing 被引量:2
1
作者 ZHOU Fucai XU Jian LI Ting 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1172-1176,共5页
How to design a multicast key management system with high performance is a hot issue now. This paper will apply the idea of hierarchical data processing to construct a common analytic model based on directed logical k... How to design a multicast key management system with high performance is a hot issue now. This paper will apply the idea of hierarchical data processing to construct a common analytic model based on directed logical key tree and supply two important metrics to this problem: re-keying cost and key storage cost. The paper gives the basic theory to the hierarchical data processing and the analyzing model to multieast key management based on logical key tree. It has been proved that the 4-ray tree has the best performance in using these metrics. The key management problem is also investigated based on user probability model, and gives two evaluating parameters to re-keying and key storage cost. 展开更多
关键词 MULTICAST logical key tree hierarchical data processing
下载PDF
Authenticated Key Agreement in Group Settings
2
作者 李明 王勇 +1 位作者 谷大武 白英彩 《Journal of Beijing Institute of Technology》 EI CAS 2006年第2期186-189,共4页
An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-e... An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings. 展开更多
关键词 key agreement implicit key authentication key tree PAIRINGS
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部