期刊文献+
共找到44篇文章
< 1 2 3 >
每页显示 20 50 100
An efficient scalable key management scheme for secure group communication
1
作者 张骏 谷大武 +1 位作者 马范援 白英彩 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期607-612,共6页
Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle ... Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle muhicast infrastructure, this approach results in a highly efficient key update mechanism in which the number of muhicast messages transmitted upon a membership update is proportional to the depth of the tree, which is logarithmic to the size of the secure muhicast group. But this is based on the hypothesis that the tree is maintained in a balanced manner. This paper proposes a scalable rekeying scheme---link-tree structure for implementing secure group communication. Theoretical calculation and experimentation show that this scheme has better performance than the tree structure and the star structure, and at the same time still keep the link-tree structure balanced. 展开更多
关键词 group security key management rekey
下载PDF
A new group key management scheme based on keys tree, XOR operation and one-way function 被引量:1
2
作者 张勇 张翼 汪为农 《Journal of Southeast University(English Edition)》 EI CAS 2006年第1期54-58,共5页
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is p... By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members. 展开更多
关键词 secure group communication group key management keys tree one-way function
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
3
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
A MULTICAST KEY MANAGEMENT SCHEME BASED ON CHARACTERISTIC VALUES OF MEMBERS 被引量:1
4
作者 Du Xiaoqiang Bao Wansu Fu Xiangqun 《Journal of Electronics(China)》 2012年第3期294-301,共8页
A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that... A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that other group members calculate new keys when a member is joining or leaving is also designed. It achieves forward secrecy and backward secrecy. Compared with typical existing centralized schemes, the storage of Group Key Controller (GKC) in our scheme halves the storage overhead of others, and communication overhead of GKC is 2 in case of joining re-keying. Especially, the leaving re-keying overhead is and the overall performance is excellent. 展开更多
关键词 security multicast key management Characteristic values COLLUSION Re-keying
下载PDF
Advanced Transition/Cluster Key Management Scheme for End-System Multicast Protocol
5
作者 Ayman El-Sayed 《International Journal of Communications, Network and System Sciences》 2012年第5期286-297,共12页
The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential t... The recent growth of the World Wide Web has sparked new research into using the Internet for novel types of group communication, like multiparty videoconferencing and real-time streaming. Multicast has the potential to be very useful, but it suffers from many problems like security. To achieve secure multicast communications with the dynamic aspect of group applications due to free membership joins and leaves in addition to member's mobility, key management is one of the most critical problems. So far, a lot of multicast key management schemes have been proposed and most of them are centralized, which have the problem of 'one point failure' and that the group controller is the bottleneck of the group. In order to solve these two problems, we propose a Key Management Scheme, using cluster-based End-System Multicast (ESM). The group management is between both 1) the main controller (MRP, Main Rendezvous Point) and the second controllers (CRP, Cluster RP), and 2) the second controllers (CRPs) and its members. So, ESM simplifies the implementation of group communication and is efficient ways to deliver a secure message to a group of recipients in a network as a practical alternative to overcome the difficulty of large scale deployment of traditional IP multicast. In this paper, we analyze different key management schemes and propose a new scheme, namely Advanced Transition/Cluster Key management Scheme (ATCKS) and find it has appropriate performance in security. 展开更多
关键词 multicast Protocol End-System multicast Application-Level multicast security group key management
下载PDF
SECURE GROUP COMMUNICATIONS FOR LARGE DYNAMIC MULTICAST GROUP
6
作者 Liu Jing Zhou Mingtian (College of Computer Science and Engineering, UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2003年第4期265-273,共9页
As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dy... As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme. 展开更多
关键词 multicast security group communication group key management Access control Secret key tree
下载PDF
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks
7
作者 Mi Wen Zhi Yin +1 位作者 Yu Long Yong Wang 《Wireless Sensor Network》 2010年第9期689-697,共9页
Wireless sensor networks (WSNs) and wireless mesh networks (WMNs) are popular research subjects. The interconnection of both network types enables next-generation applications and creates new optimization opportunitie... Wireless sensor networks (WSNs) and wireless mesh networks (WMNs) are popular research subjects. The interconnection of both network types enables next-generation applications and creates new optimization opportunities. Currently, plenty of protocols are available on the security of either wireless sensor networks or wireless mesh networks, an investigation in peer work underpins the fact that neither of these protocols is adapt to the interconnection of these network types. The internal cause relies on the fact that they differ in terms of complexity, scalability and network abstraction level. Therefore, in this article, we propose a unified security framework with three key management protocols, MPKM, MGKM, and TKM which are able to provide basic functionalities on the simplest devices and advanced functionalities on high performance nodes. We perform a detailed performance evaluation on our protocols against some important metrics such as scalability, key connectivity and compromise resilience, and we also compare our solution to the current keying protocols for WSNs and WMNs. 展开更多
关键词 Wireless MESH Sensor Network key management ADAPTIVE security group key
下载PDF
Performance study on Gossip-based group key distribution protocal
8
作者 Yao Yan Ma Jianqing Zhong Yiping Zhang Shiyong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期699-704,F0003,共7页
Group key distribution is faced with two important problems, i.e. reliability and scalability, to support security multicast for large and dynamic groups. With group member increasing, traditional reliable multicast p... Group key distribution is faced with two important problems, i.e. reliability and scalability, to support security multicast for large and dynamic groups. With group member increasing, traditional reliable multicast protocol can not deal with them fully. Gossip-based group key distribution idea for wide-area dissemination was provided. It is based on an gossip-based loss recovery control mechanism. It can provide a probabilistic reliable guarantee for a information dissemination to reach every group member, which can achieve scalability and reliability. To achieve full reliability, three layers protocol model in group key distribution was provided. One is best effect layer, which provides unreliable dissemination. Other is gossip-based loss recovery layer, which provides probabilistic reliable guarantee. Last is vsync-based layer, which provide deterministic loss recovery. We integrate probabilistic loss recovery method with deterministic one. The model possess scalability that probabilistic method has and full reliability prosthesis by vsync-based. To evaluate the effectiveness of gossip technique in scalable and reliable multicast protocols. We have compared gossip protocol with other reliable multicast protocols. Experimental result shows that gossip protocol has better scalability than other. 展开更多
关键词 key management group key distribution gossip-based reliable multicast RELIABILITY scalability.
下载PDF
Identity Based Group Key Agreement from Bilinear Pairing
9
作者 WANG Liming WU Chuankun 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1731-1735,共5页
We present a provably secure authenticated tree based key agreement scheme for multicast. There is a wide variety of applications that can benefit from using our scheme, e. g. , pay-Tv, teleconferencing, software upda... We present a provably secure authenticated tree based key agreement scheme for multicast. There is a wide variety of applications that can benefit from using our scheme, e. g. , pay-Tv, teleconferencing, software updates. Compared with the previous published schemes, our scheme provides group member authentication without introducing additional mechanism. Future, we give the security proof of our scheme under the random oracle model. 展开更多
关键词 group key agreement multicast bilinear pairing provable security
下载PDF
HUFFMAN-BASED GROUP KEY ESTABLISHMENT SCHEME WITH LOCATION-AWARE
10
作者 Gu Xiaozhuo Yang Jianzu Lan Julong 《Journal of Electronics(China)》 2009年第2期237-243,共7页
Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-... Time efficiency of key establishment and update is one of the major problems contributory key managements strive to address.To achieve better time efficiency in key establishment,we propose a Location-based Huffman(L-Huffman) scheme.First,users are separated into several small groups to minimize communication cost when they are distributed over large networks.Second,both user's computation difference and message transmission delay are taken into consideration when Huffman coding is employed to forming the optimal key tree.Third,the combined weights in Huffman tree are located in a higher place of the key tree to reduce the variance of the average key generation time and minimize the longest key generation time.Simulations demonstrate that L-Huffman has much better performance in wide area networks and is a little better in local area network than Huffman scheme. 展开更多
关键词 secure group communication Contributory group key management group key estab-lishment
下载PDF
安全组播综述 被引量:8
11
作者 赵膺 宋佳兴 +1 位作者 徐万鸿 刘卫东 《小型微型计算机系统》 CSCD 北大核心 2003年第10期1873-1877,共5页
组播提供了一种发送者同时发送信息到多个接收者的高效通信机制 ,但是组播的安全问题却阻碍了组播技术的广泛使用 .文章首先讨论了组播所面临的安全风险 ,解释安全风险产生的原因 ,并归纳总结组播的安全问题 ;然后对其中两个需要迫切解... 组播提供了一种发送者同时发送信息到多个接收者的高效通信机制 ,但是组播的安全问题却阻碍了组播技术的广泛使用 .文章首先讨论了组播所面临的安全风险 ,解释安全风险产生的原因 ,并归纳总结组播的安全问题 ;然后对其中两个需要迫切解决的安全问题的解决方案进行深入的论述 。 展开更多
关键词 组播 组播安全 源认证 组密钥管理
下载PDF
IP多播组密钥管理方案分类体系研究 被引量:13
12
作者 陆正福 李亚东 何英 《计算机工程与科学》 CSCD 2004年第10期23-26,33,共5页
IP多播组密钥管理问题是IP多播安全的核心问题。本文通过对现有组密钥管理方案和密钥管理本身规律的研究,给出了组密钥管理方案的详细分类,该分类对分析和改进已有方案、设计新的方案具有重要的指导意义。
关键词 组密钥管理 IP多播 细分 方案 安全 设计 分类体系 核心问题 指导意义 规律
下载PDF
大型动态多播群组的密钥管理和访问控制 被引量:18
13
作者 刘璟 周明天 《软件学报》 EI CSCD 北大核心 2002年第2期291-297,共7页
随着因特网用户的急剧增加和因特网不断的商业化,多播技术呈现出极为广阔的应用领域.在国际上,多播是一个崭新的学术研究领域,主要的研究成果集中在多播的路由算法、流量控制、拥塞控制和可靠传输上,多播安全领域的研究成果相对较少(尤... 随着因特网用户的急剧增加和因特网不断的商业化,多播技术呈现出极为广阔的应用领域.在国际上,多播是一个崭新的学术研究领域,主要的研究成果集中在多播的路由算法、流量控制、拥塞控制和可靠传输上,多播安全领域的研究成果相对较少(尤其是在组通信密钥管理方面).研究了多播安全机制中的组通信密钥管理和访问控制问题.提出了一种基于子组安全控制器的组通信密钥管理和访问控制方案,该安全方案改进并解决了IOLUS系统和WGL方案中存在的若干问题,简化了访问控制策略,达到了预期的设计目标和要求. 展开更多
关键词 多播安全 组通信 访问控制 密钥树 组密钥管理 Internet
下载PDF
TTR:用于安全组密钥管理的改进批次更新方案 被引量:4
14
作者 马义忠 付东亚 +1 位作者 易纪海 张聪 《计算机工程与应用》 CSCD 北大核心 2005年第10期149-152,211,共5页
多播组密钥管理是多播安全中的核心问题之一,针对它近年来已经提出了很多方案,其中大部分是在收到请求后立即处理的单次更新方法。XiaozhouLi等人提出了基于更新间隔的批次更新方法。该文对基于更新间隔的批次更新方案进行了改进,提出... 多播组密钥管理是多播安全中的核心问题之一,针对它近年来已经提出了很多方案,其中大部分是在收到请求后立即处理的单次更新方法。XiaozhouLi等人提出了基于更新间隔的批次更新方法。该文对基于更新间隔的批次更新方案进行了改进,提出给每个请求加一个TTR(TimeToRekey),密钥更新在有请求的TTR变为0的时候进行。试验表明基于TTR的批次更新不仅提高了效率,改进了密钥树的平衡性,还解决了应用中的一些实际问题。 展开更多
关键词 多播安全 组密钥管理 批次更新
下载PDF
一种适用于大型动态群组的密钥管理方案 被引量:3
15
作者 武涛 郑雪峰 +1 位作者 姚宣霞 雷雪梅 《小型微型计算机系统》 CSCD 北大核心 2008年第4期639-642,共4页
组播是一种基于组的有效的数据传输方式,安全组播对许多组播应用程序非常必要.如何在一个大型动态多播群组中实现高效的安全组播,是一个具有挑战性的难题.提出一种新的基于逻辑密钥树的密钥管理方案,该方案集中使用了单向函数,XOR运算,... 组播是一种基于组的有效的数据传输方式,安全组播对许多组播应用程序非常必要.如何在一个大型动态多播群组中实现高效的安全组播,是一个具有挑战性的难题.提出一种新的基于逻辑密钥树的密钥管理方案,该方案集中使用了单向函数,XOR运算,伪随机函数等,大大降低了组控制器的存储量,并且提高了密钥更新的效率.与现存的其他基于逻辑密钥树的方案相比,具有明显的优越性,更适用于大型动态多播群组. 展开更多
关键词 组播通信 安全组播 组密钥管理 单向函数 XOR运算
下载PDF
基于椭圆曲线的分布式组播密钥管理方案 被引量:3
16
作者 徐守志 杨宗凯 谭运猛 《小型微型计算机系统》 CSCD 北大核心 2006年第4期651-654,共4页
分布式安全组播在互联网上有广泛的应用,但密钥生成和密钥更新的计算开销以及密钥带宽是主要的制约因素.本文提出基于椭圆曲线加密的组共享密钥生成机制,并将其应用到组播中提出两种分布式安全组播方案.组共享密钥嵌入所有用户的私钥,... 分布式安全组播在互联网上有广泛的应用,但密钥生成和密钥更新的计算开销以及密钥带宽是主要的制约因素.本文提出基于椭圆曲线加密的组共享密钥生成机制,并将其应用到组播中提出两种分布式安全组播方案.组共享密钥嵌入所有用户的私钥,安全性高,与已有的技术相比,在同等安全强度下,计算开销和带宽开销较小,组共享密钥更新效率高. 展开更多
关键词 安全组播 分布式组播 组密钥管理 椭圆曲线
下载PDF
基于代理的分布式大型动态组播密钥管理协议 被引量:3
17
作者 魏楚元 李陶深 王高才 《计算机工程与应用》 CSCD 北大核心 2007年第7期155-159,共5页
参照分布式方法代表性协议Iolus提供的组播密钥管理安全框架和因特网组管理协议IGMP,设计了一种新的分布式密钥管理体系结构,组播组由一些分布的组播子组构成,采用一种改进的LKH协议实现子组内密钥管理,提出了一种基于代理的分布式的大... 参照分布式方法代表性协议Iolus提供的组播密钥管理安全框架和因特网组管理协议IGMP,设计了一种新的分布式密钥管理体系结构,组播组由一些分布的组播子组构成,采用一种改进的LKH协议实现子组内密钥管理,提出了一种基于代理的分布式的大型动态组播密钥管理协议,并通过增加签名标记改进了现有密钥管理协议对成员身份认证的不足。与LKH、Iolus协议相比,该文协议降低了“1影响N”问题,具有较好的可扩展性,有效降低了协议通信延迟和带宽等负载。 展开更多
关键词 组播 组密钥管理 逻辑密钥树 密钥更新 组安全代理
下载PDF
基于广义猫映射的组播密钥管理方案研究 被引量:2
18
作者 杨军 覃伯平 雷开彬 《计算机科学》 CSCD 北大核心 2008年第1期80-82,107,共4页
为处理组密钥管理中的"1影响n问题",曹国梁等人提出了组密钥与个体密钥之间存在广义猫映射关系的组播加密算法及其密钥管理方案。我们进一步分析其密码强度、前向/后向保密性和可扩展性问题。解析结果表明:对已知明文攻击的... 为处理组密钥管理中的"1影响n问题",曹国梁等人提出了组密钥与个体密钥之间存在广义猫映射关系的组播加密算法及其密钥管理方案。我们进一步分析其密码强度、前向/后向保密性和可扩展性问题。解析结果表明:对已知明文攻击的脆弱性使该密码不适合提供组播数据保密性安全服务;通信开销以组规模为渐近下界,使该方案不满足大型组播组中密钥管理低带宽开销的QoS要求。分析方法对其他密码算法转化为组密钥更新协议的研究亦有积极作用。 展开更多
关键词 组播安全 组密钥管理 广义猫映射 对称密钥分组密码 穷举密码分析
下载PDF
安全组播中一种有效的密钥更新方案 被引量:1
19
作者 武涛 郑雪峰 姚宣霞 《计算机工程》 CAS CSCD 北大核心 2007年第18期151-153,共3页
组密钥管理作为安全组播的核心问题之一,已成为近年来研究的热点。该文在分析了已有组密钥管理方案的基础上,针对一对多的通信方式提出了一种有效的密钥管理方案,该方案在有成员变动时,与以往的密钥管理方案相比,大大降低了计算量及通信... 组密钥管理作为安全组播的核心问题之一,已成为近年来研究的热点。该文在分析了已有组密钥管理方案的基础上,针对一对多的通信方式提出了一种有效的密钥管理方案,该方案在有成员变动时,与以往的密钥管理方案相比,大大降低了计算量及通信量,对时延敏感的多播应用来讲,具有非常重要的实用价值。 展开更多
关键词 组播通信 安全组播 组密钥管理
下载PDF
基于LKH树的组播密钥管理方案设计 被引量:2
20
作者 张辉 石胜友 石倩 《计算机工程与设计》 北大核心 2019年第2期312-316,共5页
组播系统较传统的单播系统更为复杂,更难获得安全保障,在组规模较大的情况下实际应用有一定困难。研究组播通信的安全隐患及组播安全机制优劣的评价标准,对照分析几种典型组播源认证协议的特性、问题及适用场合;以基于LKH树的密钥管理... 组播系统较传统的单播系统更为复杂,更难获得安全保障,在组规模较大的情况下实际应用有一定困难。研究组播通信的安全隐患及组播安全机制优劣的评价标准,对照分析几种典型组播源认证协议的特性、问题及适用场合;以基于LKH树的密钥管理方案和Iolus密钥管理方案为基础,提出一种针对大规模组播的密钥管理方案;指出该方案折中了分布式与层次式密钥管理的优劣,分析该方案的性能优势并验证其性能。 展开更多
关键词 组播 通信安全 源认证 组密钥 密钥管理
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部