Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid mu...Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid much attention to before.On the basis of a well known protocol relationship named protocol conversion, three novel protocol relationships including protocol collaboration relationship, protocol cooperation relationship and protocol independent relationship are presented, so that protocol relationships are classified into four types.According to the functionality and purpose of each protocol, main protocols related to softswitch are divided into five groups.As to protocol conversion in softswitch, information flow trail(IFT) is utilized to facilitate problem solving.A decision rule for protocol conversion mode is proposed to guide how to choose between direct conversion and indirect conversion.A property of protocol relationships in softswitch is induced from all kinds of service scenarios of softswitch.This property summarizes protocol relationships within each protocol group or between two specific protocol groups.A merit of protocol grouping together with classification of protocol relationship is also presented.The effort of this paper pushes the protocol engineering to go ahead.展开更多
Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of pr...Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.展开更多
Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,t...Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,this paper explores an approach to analyze group key exchange protocols,which realize automation and guarantee the soundness of cryptography. Considered that there exist many kinds of group key exchange protocols and the participants’ number of each protocol is arbitrary. So this paper takes the case of Burmester-Desmedt(BD) protocol with three participants against passive adversary(3-BD-Passive) . In a nutshell,our works lay the root for analyzing group key exchange protocols automatically without sacrificing soundness of cryptography.展开更多
Nowadays some promising authenticated group key agreement protocols are constructed on braid groups, dynamic groups, pairings and bilinear pairings. Hence the non-abelian structure has attracted cryptographers to cons...Nowadays some promising authenticated group key agreement protocols are constructed on braid groups, dynamic groups, pairings and bilinear pairings. Hence the non-abelian structure has attracted cryptographers to construct public-key cryptographic protocols. In this article, we propose a new authenticated group key agreement protocol which works in non-abelian near-rings. We have proved that our protocol meets the security attributes under the assumption that the twist conjugacy search problem(TCSP) is hard in near-ring.展开更多
Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to...Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.展开更多
To solve the problem of providing the best initial situation for terminal guidance when multiple missiles intercept multiple targets,a group cooperative midcourse guidance law(GCMGL)considering time-to-go is proposed....To solve the problem of providing the best initial situation for terminal guidance when multiple missiles intercept multiple targets,a group cooperative midcourse guidance law(GCMGL)considering time-to-go is proposed.Firstly,a threedimensional(3D)guidance model is established and a cooperative trajectory shaping guidance law is given.Secondly,for estimating the unknown target maneuvering acceleration,an adaptive disturbance observer(ADO)is designed,combining finitetime theory with a radial basis function(RBF)neural network,and the convergence of the estimation error is proven using Lyapunov stability theory.Then,to ensure time-to-go cooperation among missiles within the same group and across different groups,the group consensus protocols of virtual collision point mean and the inter-group cooperative consensus protocol are designed respectively.Based on the group consensus protocols,the virtual collision point cooperative guidance law is given,and the finite-time convergence is proved by Lyapunov stability theory.Simultaneously,combined with trajectory shaping guidance law,virtual collision point cooperative guidance law and the intergroup cooperative consensus protocol,the design of GCMGL considering time-to-go is given.Finally,numerical simulation results show the effectiveness and the superiority of the proposed GCMGL.展开更多
ID-based constant-round group key agreement protocols are efficient in both computation and communication, but previous protocols did not provide valid message authentication. An improvement based on attack analysis i...ID-based constant-round group key agreement protocols are efficient in both computation and communication, but previous protocols did not provide valid message authentication. An improvement based on attack analysis is proposed in this paper. The improved method takes full advantage of the data transmitted at various stages of the protocol. By guaranteeing the freshness of authentication messages, the authenticity of the generator of authentication messages, and the completeness of the authenticator, the improved protocol can resist various passive and active attacks. The forward secrecy of the improved protocol is proved under a Katz-Yung (KY) model. Compared with existing methods, the improved protocol is more effective and applicable.展开更多
The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which ...The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which was obtained by combining the ElGamal encryption scheme with the ElGamal signature scheme,is efficient and simple.The protocol is proven secure against passive attack by using indistinguishable method.Moreover,both perfect forward secrecy(PFS)and key independence(KI)were achieved.Because the protocol is based on the broadcast channel,it is also suitable for key agreement in wireless communications,especially in ad-hoc networks.展开更多
基金National Science Fund for Distinguished Young Scholars (No. 60525110)National 973 Program (No. 2007CB307100, 2007CB307103)+1 种基金National Natural Science Foundation of China (No. 60902051)Development Fund Project for Electronic and Information Industry (Mobile Service and Application System Based on 3G)
文摘Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid much attention to before.On the basis of a well known protocol relationship named protocol conversion, three novel protocol relationships including protocol collaboration relationship, protocol cooperation relationship and protocol independent relationship are presented, so that protocol relationships are classified into four types.According to the functionality and purpose of each protocol, main protocols related to softswitch are divided into five groups.As to protocol conversion in softswitch, information flow trail(IFT) is utilized to facilitate problem solving.A decision rule for protocol conversion mode is proposed to guide how to choose between direct conversion and indirect conversion.A property of protocol relationships in softswitch is induced from all kinds of service scenarios of softswitch.This property summarizes protocol relationships within each protocol group or between two specific protocol groups.A merit of protocol grouping together with classification of protocol relationship is also presented.The effort of this paper pushes the protocol engineering to go ahead.
基金Supported by the National Natural Science Foun-dation of China (90104005 ,60473023) the National High Tech-nology Research and Development Programof China (863 Program)(2002AA41051)
文摘Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.
基金supported by National Natural Science Foundation of China No.61003262,National Natural Science Foundation of China No.60873237Doctoral Fund of Ministry of Education of China No.20070007071
文摘Canetti and Herzog have already proposed universally composable symbolic analysis(UCSA) to analyze mutual authentication and key exchange protocols. However,they do not analyze group key exchange protocol. Therefore,this paper explores an approach to analyze group key exchange protocols,which realize automation and guarantee the soundness of cryptography. Considered that there exist many kinds of group key exchange protocols and the participants’ number of each protocol is arbitrary. So this paper takes the case of Burmester-Desmedt(BD) protocol with three participants against passive adversary(3-BD-Passive) . In a nutshell,our works lay the root for analyzing group key exchange protocols automatically without sacrificing soundness of cryptography.
文摘Nowadays some promising authenticated group key agreement protocols are constructed on braid groups, dynamic groups, pairings and bilinear pairings. Hence the non-abelian structure has attracted cryptographers to construct public-key cryptographic protocols. In this article, we propose a new authenticated group key agreement protocol which works in non-abelian near-rings. We have proved that our protocol meets the security attributes under the assumption that the twist conjugacy search problem(TCSP) is hard in near-ring.
基金Supported by the National Natural Science Foundation of China(No.61501064)Sichuan Technology Support Program(No.2015GZ0088)
文摘Group key management technique is a fundamental building block for secure and reliable group communication systems.In order to successfully achieve this goal, group session key needs to be generated and distributed to all group members in a secure and authenticated manner.The most commonly used method is based on Lagrange interpolating polynomial over the prime field F p={0,1,2,…, p-1}. A novel approach to group key transfer protocol based on a category of algebraic-geometry code is presented over the infinite field GF(2 m). The attractive advantages are obvious. Especially, the non-repeatability, confidentiality, and authentication of group key transfer protocols are obtained easily. Besides, a more generalized and simple mathematical construction model is proposed which also can be applied perfectly to related fields of information security.
基金supported by the National Natural Science Foundation of China(62003264).
文摘To solve the problem of providing the best initial situation for terminal guidance when multiple missiles intercept multiple targets,a group cooperative midcourse guidance law(GCMGL)considering time-to-go is proposed.Firstly,a threedimensional(3D)guidance model is established and a cooperative trajectory shaping guidance law is given.Secondly,for estimating the unknown target maneuvering acceleration,an adaptive disturbance observer(ADO)is designed,combining finitetime theory with a radial basis function(RBF)neural network,and the convergence of the estimation error is proven using Lyapunov stability theory.Then,to ensure time-to-go cooperation among missiles within the same group and across different groups,the group consensus protocols of virtual collision point mean and the inter-group cooperative consensus protocol are designed respectively.Based on the group consensus protocols,the virtual collision point cooperative guidance law is given,and the finite-time convergence is proved by Lyapunov stability theory.Simultaneously,combined with trajectory shaping guidance law,virtual collision point cooperative guidance law and the intergroup cooperative consensus protocol,the design of GCMGL considering time-to-go is given.Finally,numerical simulation results show the effectiveness and the superiority of the proposed GCMGL.
基金supported by the Key Project of National Defense Basic Research Program of China (No. B1120132031)
文摘ID-based constant-round group key agreement protocols are efficient in both computation and communication, but previous protocols did not provide valid message authentication. An improvement based on attack analysis is proposed in this paper. The improved method takes full advantage of the data transmitted at various stages of the protocol. By guaranteeing the freshness of authentication messages, the authenticity of the generator of authentication messages, and the completeness of the authenticator, the improved protocol can resist various passive and active attacks. The forward secrecy of the improved protocol is proved under a Katz-Yung (KY) model. Compared with existing methods, the improved protocol is more effective and applicable.
基金supported by the National Natural Science Foundation of China(Grant No.90304009).
文摘The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which was obtained by combining the ElGamal encryption scheme with the ElGamal signature scheme,is efficient and simple.The protocol is proven secure against passive attack by using indistinguishable method.Moreover,both perfect forward secrecy(PFS)and key independence(KI)were achieved.Because the protocol is based on the broadcast channel,it is also suitable for key agreement in wireless communications,especially in ad-hoc networks.