期刊文献+

基于B-树的分布式群组密钥管理机制 被引量:2

A Distributed B-tree-based Group Key Management Scheme
下载PDF
导出
摘要 提出把B-树引入到管理机制中,并给出了加入协议和离开协议的形式化描述。B-树方案在通信开销和计算开销方面优于二叉树方案,并且二者的差距随着B-树阶数的增大和群组成员数目的增加而明显加大。在安全性方面,B-树方案能够抵抗联合攻击。 After a distributed binary tree-based group key management scheme is studied, a B-tree-based scheme is proposed in this paper. At the aspects of communication cost and computation cost, the B-tree-based scheme is better than the binary tree-based scheme and the difference becomes larger obviously as the order of B-tree and the number of group members grow. The join protocol and leave protocol are described formally. In addition, the B-tree-based scheme is secure against collusive attacks.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第20期3-4,88,共3页 Computer Engineering
基金 国家自然科学基金资助项目(6023012)
关键词 B-树 分布式群组密钥管理 分布式平等密制管理 B-tree Distributed group key management Distributed flat key management
  • 相关文献

参考文献5

  • 1Balenson D,McGrew D,Sherman A.Key Management for Large Dynamic Groups:One-way Function Trees and Amortized Inifialization[S].IETF Draft: draft-balenson-groupkeymgmt-oft-00.txt,1999-02 被引量:1
  • 2Dondeti L,Mukherjee S,Samal A.Disec: A Distributed Framework for Scalable Secure Many-to-many Communication[A]. In:Proceedings of the Fifth IEEE Symposium on Computers and Communications(ISCC 2000),2000-07 被引量:1
  • 3Menezes A,Oorschot P,Vanstone S.Handbook of Applied Cryptography [M].CRC Press Series on Discrete Mathematics and Its Applications.C RC Press, 1997 被引量:1
  • 4Fiat A, Naor M.Broadcast Encryption[A].In:Advances in Cryptology:Proceedings of Crypto 1993,LNCS 773,1993:480-491 被引量:1
  • 5Dondeti L R, Mukherjee S,Samal A.A Dual Encryption Protocol for Scalable Secure Multicasting[A].In:Fourth International Symposium on Computers and Communications, Red Sea, Egypt, 1999-07 被引量:1

同被引文献6

  • 1Amir Y.,Nita-Rotaru C.and Stanton J.,Framework for authentication and access control of client-server group communication systems,Tech.Rep.CNDS2001-2,Johns Hopkins University,Center of Networking and Distributed Systems,2001.http:∥www.cnds.jhu.edu/publications/. 被引量:1
  • 2Giuseppe Ateniese,Secure and Efficient Group Communication in Wide and Local Area Networks:[dissertation].Italy:Univ.of di Genova,1999. 被引量:1
  • 3J.Kong,H.Luo,K.Xu,D.L.Gu,M.Gerla,and S.Lu,Adaptive Security for Multi-level Ad-hoc Networks.In Journal of Wireless Communications and Mobile Computing (WCMC),volume2,pp.533~547,2002. 被引量:1
  • 4王勇 曹元大.一种基于Tate Pairings的群组密钥管理机制[A]..《第十二届网络与数据通信学术会议》[C].武汉,2002年12月.. 被引量:1
  • 5王勇,曹元大,林观銮.基于口令的可隐含认证的密钥协商协议[J].计算机工程,2002,28(11):32-33. 被引量:4
  • 6林观銮,曹元大,王勇,江宇凌.基于Spread协议的安全群组通信系统架构[J].计算机工程,2003,29(19):106-108. 被引量:4

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部