期刊文献+

TGDH协议的分析与实现 被引量:1

Design and Implementation of TGDH Protocol
在线阅读 下载PDF
导出
摘要 基于成员离开概率对TGDH协议进行优化。证明当密钥树为Huffman时,改进后的P-TGDH协议中,平均成员密钥更新量和平均指数运算时间开销均可达到最优。 We improve TGDH protocol based the probability of members leaving. When using Huffman tree as the key tree, this paper proves that the average cost of re - keying and the average time cost of exponentation computation of each member is optimal in P- TGDH protocol.
出处 《计算技术与自动化》 2005年第3期66-68,共3页 Computing Technology and Automation
基金 国家自然科学基金资助项目(60272011)
关键词 密钥协商 Diffie-Hdllman密钥交换 动态对等组 哈夫曼树 key agreement Diffie-Hellman key exchange dynamic peer group huffman tree
  • 相关文献

参考文献12

  • 1Kim Y, Perrig A, Tsudik G. Simple and fault - tolerant key agreement for dynamic collaborative groups[C]. In: Sander T,ed. Proc. of the 7th ACM Conf. on Computer and Comunications Security. New York: ACM Press, 2000,235~244.
  • 2Kim Y, Perrig A, sudik G. Tree- based group key agreement [J]. ACM Trans. Inf. Syst. Secur., 2004, 7(1): 60~96.
  • 3Steiner M, Tsudik G, Waidner M. Diffie - Hellman key distribution extended to group communication[M]. In Proc. of ACM -CCS'96. ACM Press, 1996, 31~37.
  • 4Burmestrer M, Desmedt Y. A security and efficient conference -key agreement key distribution system. Advances in Cryptology - EUROCRYPT'94[C]. Berlin: Springer-verlag, 1994,275~287.
  • 5SchneierB 吴世忠.应用密码学协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 6NIST. FIPS PUB 180- 1: Secure Hash Standard[S], 1995.
  • 7Rafaeli S, Hutchison D. A survey of key management for secure group communication[J]. ACM Computing Surveys, 2003,35(3) :309~329.
  • 8Zhu S, Setia S, Jajodia S. Performance optimizations for group key management schemes[C], in Proceedings of the 23rd International Conference on Distributed Computing Systems [J].IEEE Computer Society, 2003, 163.
  • 9屈劲,葛建华,蒋铭.安全组播的Huffman层次密钥管理[J].软件学报,2003,14(1):151-156. 被引量:8
  • 10周炯磐 丁小明.信源编码理论[M].北京:人民邮电出版社,1996..

二级参考文献1

  • 1周炯磐 丁小明.信源编码理论[M].北京:人民邮电出版社,1996..

共引文献11

同被引文献8

  • 1Christian K, Mario P. Applied quantum cryptography [M], Heidelberg: The Lecture Notes in Physics, 2010.
  • 2郭光灿.未来的信息技术[电子文献类型/OL].http://lqcc.ustc.edu.cn.2009.
  • 3Tsu W, Yuh T. Towards ID-based authenticated group key exchange protocol with identifying malicious participants[J]. Informatica, 2012, 23(2): 315-334.
  • 4Jiang Z, Bin L, Chun C. EDKAS: An efficient distrib- uted key agreement scheme using one way function trees for dynamic collaborative groups[J]. Computa- tional Engineering in Systems Applications, 2006, 12 (2) : 1215-1222.
  • 5Pratima A, Xukai Z, Byrav R. DGKD.. Distributed group key distribution with authentication capability [J]. Computer Science and Engineering, 2005, 13 ( 1 ) .. 3675-3684.
  • 6Michael S, Gene T, Michael W. Key agreement in dy namic peer groups[J]. DARPA-TTO, 1998, 1098(3) 2674-2693.
  • 7杨军,周贤伟.基于离散对数问题的两层分散式组密钥管理方案[J].电子与信息学报,2008,30(6):1457-1461. 被引量:4
  • 8刘桂,蒋天炜,喻松,顾畹仪.欧洲量子保密通信网络研究[J].光通信技术,2011,35(12):36-39. 被引量:2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部