期刊文献+

一种适用于安全多播的加密算法及密钥管理方案 被引量:3

在线阅读 下载PDF
导出
摘要 为了避免安全多播中的密钥更新,强化密钥管理和提高安全多播的效率,在分析安全多播需求的基础上,提出一种适用于安全多播的加密算法和相应的安全多播密钥管理模型,实现了无需更新密钥就可满足前向和后向加密的抗同谋破解的安全多播。分析表明,给出的加密算法拥有良好的加密强度和加密速度。这种无需更新密钥的安全多播可以应用在各类多播环境中。
作者 曹国梁 周杰
出处 《通信学报》 EI CSCD 北大核心 2005年第B01期100-105,共6页 Journal on Communications
  • 相关文献

参考文献14

  • 1JUDGE P, AMMAR M. Security issues and solutions in multicast content distribution: a survey [J]. IEEE network, 2003, 17(1):30-36.
  • 2KEI W C. Secure group communication using key graph[A].Proceedings of SIGCOMM 98[C]. New York: ACM Press,1998.68-79.
  • 3徐明伟,董晓虎,徐恪.组播密钥管理的研究进展[J].软件学报,2004,15(1):141-150. 被引量:66
  • 4WALLNER D, HARDER E, AGEE R. Key Management for Multicast: Issues and Architectures, RFC 2627[S]. 1999.
  • 5HARNEY H, MUCKENHIRN C. Group Key Management Protocol (GKMP) Specification, RFC2093[S]. 1997.
  • 6HARNEY H, MUCKENHIRN C. Group Key Management Protocol (GKMP) Architecture, RFC2094[S]. 1997.
  • 7SETINER M, TAUDIK G, CLIQUES W M. A New Approach to Group Key Agreement[R]. Technical Report, RZ 2984, IBM Research, 1997.
  • 8MITTRA S. lolus: A framework for scalable secure multicasting[A]. ACM SIGCOMM Computer Communication Review[C]. New York: ACM Press, 1997. 277-288.
  • 9MICHAEL S, TSUDIK G, WAIDNER M, et al. Key distribution extended to group communication[A]. Proceedings of the 3rd ACM Conference on Computer and Communications Security[C]. 1996.14-16.
  • 10马在光,丘水生.基于广义猫映射的一种图像加密系统[J].通信学报,2003,24(2):51-57. 被引量:76

二级参考文献16

  • 1[1]Harney H, Muckenhirn C. Group key management protocol (GKMP) specification. RFC2093, 1997.
  • 2[2]Harney H, Muckenhirn C. Group key management protocol (GKMP) architecture. RFC2094, 1997.
  • 3[3]Setiner M, Taudik G, Waidnet M. Cliques: A new approach to group key agreement. Technical Report, RZ 2984, IBM Research, 1997.
  • 4[4]Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,IT-22(6):644~654.
  • 5[5]Mittra S. Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM Computer Communication Review, Volume 27, Issue 4. New York: ACM Press, 1997. 277~288.
  • 6[6]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architec-tures. RFC 2627, 1999.
  • 7[7]Waldvogel M, Garonni G, Sun D, Weiler N, Plattner B. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications (Special Issue on Middleware), 1999,17(9):1614~1631.
  • 8[8]Balenson D, McGrew D, Sherman A. Key management for large dynamic groups: One-Way function trees and amortized initialization. IETF Internet Draft (work in progress), 2000.
  • 9[9]Canetti R, Caray J, Itkis G, Micciancio D, Naorr M, Pinkas B. Multicast security: A taxonomy and some efficient constructions. In: Proc. of the INFOCOM'99. New York, 1999. 708~716.
  • 10[10]Yang L, Li XS, Zhang XB, Lam SS. Reliable group rekeying: A performance analysis. In: ACM SIGCOMM 2001. San Diego, 2001. 27~31.

共引文献140

同被引文献24

  • 1[2]JUDGE P, AMMAR M.Security issues and solutions in multicast contentdistribution:asurvey[J]. Network, IEEE. 2003, 17(1):30-36.
  • 2[3]HARNEY H, MUCKENHIRN C. Group key management protocol (GKMP) architecture[J]. RFC 2094 (Experimental), 1997[2005-06-10].
  • 3[4]HARNEY H, MUCKENHIRN C. Group key management protocol GKMP) specification[J]. RFC 2093(1997)[2005-07-19].
  • 4[5]HARDJONO T, CAIN B. Simple key management protocol for PIM[J]. Internet Engineering Task Force, 2000, 20(1):15-30.
  • 5[6]SETINER M, TAUDIK G, WAIDNET M. Cliques:A new approach to group key agreement[J]. IBM Research Report, 1997, 29(6):1-17.
  • 6[8]RIVEST R, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM,1978, 21(2):120-129.
  • 7SUN Y L, RAY LIU K J. Analysis and protection of dynamic mem- bership information for group key distribution schemes [ J ]. IEEE Transactions on Information Forensics and Security, 2007, 2(2): 213-226.
  • 8CtIALLAL Y, SEBA H. Group key management protocols: A novel taxonomy [ J ]. International Journal of Information Technology, 2005, 2(1) : 105 - 118.
  • 9PHAM T, WATTERS P. The efficiency of periodic rekeying in dy- namic group key management [ C ]//ECUMN'07: Proceedings of the Fourth European Confference on Universal Muhiservice Networks. Washington, DC: IEEE Computer Society, 2007:425-432.
  • 10RAFAELI S, HUTCHISON D. A survey of key management for secure group communication[ J ]. ACM Computing Surveys, 2003, 35 (3) : 309 - 329.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部