期刊文献+

基于m叉树与DH协议的组密钥协商协议 被引量:6

Group Key Agreement Protocol Based on m-tree and DH Protocol
在线阅读 下载PDF
导出
摘要 为在动态对等通信环境下提高群组密钥协商的高效性与可扩展性,提出一种将m叉树结构与DH协议有机结合的组密钥协商协议。该协议与TGDH协议相比,通过采用m叉树结构,降低树的高度,减少计算量,与GDH协议相比,通过采用逐层式协商,降低通信开销。采用可变m叉树平衡该协议的计算开销与通信开销,使之同时适用广域网与局域网环境。 This paper proposes a group key agreement protocol based on m-tree and DH protocol to improve the poor scalability and efficiency of most group key agreement protocols in dynamic peer communication. Compared with TGDH, this protocol reduces the depth of key tree efficiently and computing costs of group key agreement by adopting m-tree. Compared with GDH, this protocol reduces communication costs of the group key agreement through layer-by-layer agreement. Communication and computing costs are balanced by variable m-tree, which makes a great progress in applications of LAN and WAN.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第1期161-163,169,共4页 Computer Engineering
基金 国家"863"计划基金资助项目(2007AA01Z405) 国家自然科学基金资助项目(60503012)
关键词 动态对等通信 安全群组通信 组密钥协商 可证明安全性 dynamic peer communication secure group communication group key agreement provable security
  • 相关文献

参考文献5

二级参考文献38

  • 1Burmestrer M, Desmedt Y. A security and efficient conference-key agreement key distribution system. Advances in Cryptology -EUROCRYPT'94. Berlin: Springer-verlag, 1994. 275-287.
  • 2Kim Y, Perrig A, Tsudik G. Communication-Efficent group key agreement. In: Dupuy M, Paradinas P, eds. Proc. of the IFIP SEC 2001. 2001. 229-244.
  • 3Stein M, Tsudik G, Waidner M. Key agreement in dynamic peer groups. IEEE Trans. on Parallel and Distributed Systems,2000,11 (8):769-780.
  • 4Kim Y, Perrig A, Tsudik G. Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Sander T, ed. Proc. of the 7th ACM Conf. on Computer and Comunications Security. New York: ACM Press, 2000. 235~244.
  • 5Lai XS, Han L, Zhang ZC ,Zhang YQ, Xiao GZ. Computer Cryptography and Application. Beijing: National Defence Industry Publishing House, 2001(in Chinese).
  • 6Amir Y, Kim Y, Nita-Rotaru C, Tsudik G. On the performance of group key agreement protocols, 2001. http://www.cnds.jhu.edu/pub/papers/cnds-2001-5.ps.gz
  • 7Bellare M, Neven G. Transitive signatures based on factoring and RSA. In: Zheng Y, ed. Proc. of the Advances in CryptologyASIACRYPT 2002. LNCS 2501, Berlin, Heidelberg: Springer-Verlag, 2002. 397-4 14.
  • 8Goh EJ, Jarecki S. A signature scheme as secure as the Diffie-Hellman problem. In: Biham E, ed. Proc. of the Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin, Heidelberg: Springer-Verlag, 2003. 401-415.
  • 9Koeune F. Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators [Ph.D. Thesis]. Louvain-la-Neuve: Universite Catholique de Louvain, 2001.
  • 10Gennaro R, Halevi S, Rabin T. Secure Hash-and-sign signatures without the random oracle. In: Stern J, ed. Proc. of the Advances in Cryptology-EUROCRYPT'99. LNCS 1592, Berlin, Heidelberg: Springer-Verlag, 1999.123-139.

共引文献118

同被引文献30

  • 1许勇,陈恺.安全多播中基于成员行为的LKH方法[J].软件学报,2005,16(4):601-608. 被引量:14
  • 2杨永生,施笑安.基于串口嵌入式操作系统的远程监控系统[J].西安科技大学学报,2005,25(2):204-207. 被引量:15
  • 3何鹏举,戴冠中,傅磊,徐苛杰.远程网络化测控系统研究与实现[J].微电子学与计算机,2006,23(7):195-198. 被引量:7
  • 4Burmester M, Desmedt Y. A Secure and Efficient Conference Key Distribution System[C]//Proceedings of EUROCRYPT’94. Perugia, Italy: [s. n.], 1994: 275-286.
  • 5Stenier M, Tsudik G, Waidner M. Diffie-Hellman Key Distribution Extended to Group Communication[C]//Proc. of ACM Conference on Computer and Communications Security. New Delhi, India: ACM Press, 1996: 31-37.
  • 6Steiner M, Tsudik G, Waidner M. Key Agreement in Dynamic Peer Groups[J]. IEEE Trans. on Parallel and Distributed Systems, 2000, 11(8): 769-780.
  • 7Kim Y, Perrg A, Tsudik G. Tree-based Group Diffie-Hellman Protocol[J]. ACM Transactions on Information and System Security, 2004, 7(1): 60-96.
  • 8Lee W, Kim D, Kom G, et al. An Efficient Tree Based Group Key Agreement Using Bilinear Map[C]//Proc. of Conference on Applied Cryptography and Network Security. Berlin, Germany: Springer-Verlag, 2003: 357-371.
  • 9Rafaeli S,Hutchison D.A Survey of Key Management for Secure Group Communication[J].ACM Computing Surveys,2003,35(3):309-329.
  • 10Trappe W,Song J,Poovendran R,et al.Key distribution for secure multimedia multicasts via data embedding[C]//Proceedings of the Acoustics,Speech,and Signal Processing.Salt Lake City:IEEE Signal Processing Society,2001:1449-1452.

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部