期刊文献+

基于椭圆曲线密码体制的大型动态多播组的分层二级密钥管理 被引量:3

Hierarchical Two-Level Key Management for Large Dynamic Multicast Groups Based on the Elliptic Curve Cryptosystem
在线阅读 下载PDF
导出
摘要 对于大型动态多播组的密钥管理,目前都存在一个共性难题:为了确保组通信安全,组内成员需要共享一个组通信密钥。对于组中频繁的成员变化,需要相应改变组通信密钥,这样的系统开销很庞大。本文提出一种基于椭圆曲线密码体制的大型动态多播组的分层二级密钥管理方案,将原来的组通信密钥改为多层两级密钥,这样大大减小了系统开销,便于管理,并且使用椭圆曲线密码体制加强了通信安全。 For the key management of large dynamic multicast groups, there is a common difficulty: In order to insure group communication security, the members of a group are required to share a group communication key. But, when the numbers often change, the key must be often changed too. So the system overhead is very large. In this paper, we present a hierarchical two-level key management for large dynamic multicast groups based on the elliptic curve cryptosystem. The group communication key is substituted by multiplayer and two-level keys. In this scheme, the system overhead is reduced greatly, and the group key management becomes easy. The communication security can be increased by applying the elliptic curve cryptosystem.
作者 石润华 钟诚
出处 《计算机工程与科学》 CSCD 2003年第6期22-24,共3页 Computer Engineering & Science
基金 广西重点学科建设基金 广西大学科研基金资助项目(20001115)
关键词 椭圆曲线密码体制 多播安全组 组密钥管理 密钥树 multicast security group key management secret key tree elliptic curve cryptosystem
  • 相关文献

参考文献3

二级参考文献15

  • 1陆向艳.密钥恢复系统的研究与实现[硕士学位论文].南宁:广西大学,2000..
  • 2Sun H M, Shieh S P. Construction of Dynamic Threshold Schemes. Electronics Letters, 1994, 30 (24): 2023 - 2025.
  • 3张建中,谢淑翠.个新的可防止欺诈的动态秘密分享方案.密码学进展-CHINACRYPT'2000,北京:科学出版社.2000.
  • 4陆向艳,学位论文,2000年
  • 5韦卫,通信保密,1999年,1期,8页
  • 6Wong, C. K., Gouda, M., Lam, S. S. Secure group communication using key graphs. Technical Report, TR 97-23, Department of Computer Science, University of Texas at Austin.
  • 7Mittra, S. IOLUS: a framework for scaleable secure multicast. ACM Computer Communication, 1997,27(3):277~288.
  • 8Harney, H., Muckenhirn,C. Group key management protocol (GKMP) architecture. RFC 2094, 1997.
  • 9Ballardie, A. Scalable multicast key distribution. RFC 1949, 1996.
  • 10Hardjono, T., Cain, B., Doraswamy, N. A framework for group key management for multicast security. Internet draft draft-ietf- ipsec-gkmframework-00.txt, 1998. http://www.ipmulticast.com/techcent.htm.

共引文献42

同被引文献29

  • 1V Miller.Uses of elliptic curves in cryptography[C].In:Advances in Cryptology-CRYPTO'85,Lecture Notes in Computer Science,volume 218, Springer-Verlag, 1986 : 417-426.
  • 2N Koblitz.Elliptic curve cryptosystems[J].Math Comp, 1987; (48) : 203 -209.
  • 3J lopez ,R Dahab.An Overview of Elliptic Curve Cryptography[R]. Technical Report,Institute of Computing,State University of Campinas, Braizl, 2000-05.
  • 4Relatório T6cnico IC-00-10.An Overview of Elliptic Curve Cryptography.Institute of Computing,State University of Campinas,Braizl,2000.
  • 5M Brown,D Hankerson,J Lopez et al.Software implementation of the. NIST elliptic curves over prime fields[C].In:Topics in Cryptology- CT-RST 2001 ,LNCS vol.2020,2001:250-265.
  • 6D Hankerson ,J L6pez,A Menezes.Software Implementation of Elliptic Curve Cryptography Over Binary Fields[C].In:Cryptographic Hardware and Embedded systems-CHES 2000,LNCS 1965.2000:3-24.
  • 7F Morain,J Olivos.Speeding up the computations on an elliptic curve using addition-subtraction chains[J].Informatique théorique et applications, 1990 ,24: 531-544.
  • 8J Solinas.Efficient arithmetic on Koblitz curves[J].Designs,Codes and Cryptography,2000; 19:195-249.
  • 9Alfred J Menezes.Paul C van Oorschot,Scott A Wanstone.Handbook of Applied Cryptography[M].London : CRC Press, 1996.
  • 10E F Brickell,D M Gordon,K S McCurley et al.Fast exponentiation with precomputation[C].ln:Advances in Cryptology-Proceedings of EURO-CRYPT' 92, LNCS Springer-Verlag, Berlin, 1993 ;658 : 200-207.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部