In RFC1949,A. Ballardie proposed a method of scalable multicast key distribution based on the Core Based Tree multicast protocol fitting for wide-area IP multicasting. This paper analyses the method deeply,points out ...In RFC1949,A. Ballardie proposed a method of scalable multicast key distribution based on the Core Based Tree multicast protocol fitting for wide-area IP multicasting. This paper analyses the method deeply,points out that the model can't resist the key compromise of a single member effectively,and proposes two kinds of improvement. One is the distributed generating and distributing group data encryption key,the other one is partitioning the group into subgroups. These improvements can increase the security and lifetime of the group key,and decrease the loss of compromise of a single group key encryption key.展开更多
The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network (MP2PN...The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network (MP2PN). The MP2PN contains some super peers and each super peer controls a subgroup composed of regular peers. An efficient attribute-based signature based on Cipertext-Policy Attribute-Based Encryption (CP-ABE) is proposed and used in this group-key management protocol to authenticate a peer's attributes and identity. A peer can be described by a set of attributes or one unique special identity attribute. Peers that have some attributes in common can form a group and communicate with each other anonymously and securely. Any super peer can initiate a group and act as a group controller. The group controller can authenticate a peer's attributes and identity as well as remove malicious peers. Any peer with attributes that matches the access structure can join the group and provide its input to form the group key. The proposed protocol provides backward and forward secrecy. The simulation results show that this protocol is applicable for mobile devices and can meet the MP2PN requirements of group communication.展开更多
文摘In RFC1949,A. Ballardie proposed a method of scalable multicast key distribution based on the Core Based Tree multicast protocol fitting for wide-area IP multicasting. This paper analyses the method deeply,points out that the model can't resist the key compromise of a single member effectively,and proposes two kinds of improvement. One is the distributed generating and distributing group data encryption key,the other one is partitioning the group into subgroups. These improvements can increase the security and lifetime of the group key,and decrease the loss of compromise of a single group key encryption key.
基金This paper was supported by the National Natural Science Foundation of China under Grant No. 61073042 the Fundamental Research Funds for the Central Universities under Grant No HEUCF100606 the Open Foundation of Network and Data Security Key Laboratory of Sichuan Province under Crant No 201107.
文摘The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network (MP2PN). The MP2PN contains some super peers and each super peer controls a subgroup composed of regular peers. An efficient attribute-based signature based on Cipertext-Policy Attribute-Based Encryption (CP-ABE) is proposed and used in this group-key management protocol to authenticate a peer's attributes and identity. A peer can be described by a set of attributes or one unique special identity attribute. Peers that have some attributes in common can form a group and communicate with each other anonymously and securely. Any super peer can initiate a group and act as a group controller. The group controller can authenticate a peer's attributes and identity as well as remove malicious peers. Any peer with attributes that matches the access structure can join the group and provide its input to form the group key. The proposed protocol provides backward and forward secrecy. The simulation results show that this protocol is applicable for mobile devices and can meet the MP2PN requirements of group communication.