期刊文献+

基于离散对数问题的两层分散式组密钥管理方案 被引量:4

A Two-level Decentralized Group Key Management Scheme Based on the Discrete Logarithm Problem
下载PDF
导出
摘要 该文基于"多个解密密钥映射到同一加密密钥"的公钥加密算法提出一个组密钥更新协议,结合LKH算法为特定源多播模型设计一个两层分散式组密钥管理方案。证明它具有后向保密性、高概率的前向保密性和抗串谋性。通过上层私钥的长寿性和密钥转换的方法来缓解子组管理者的性能瓶颈及共享组密钥方法中普遍存在的"1影响n"问题。分析表明,采用混合密码体制的新方案在一定程度上兼备了两类不同组密钥管理方法的优势。 Based on a public-key encryption algorithm with "multiple decryption keys mapping to one encryption key" , a group re-keying protocol is proposed and then combining the protocol with the LKH algorithm a two-level decentralized group key management scheme is designed for Source Specific Multicast(SSM). Its backward secrecy, forward secrecy and non-collusion with high probability are demonstrated. The performance bottleneck of subgroup managers and the "l-affects-n" problem existing universally in the common group key approach are mitigated through the long-livedness of private keys in the upper level and the method of key translation. The analysis shows that adopting a hybrid cryptosystem the novel scheme possesses some advantages of two distinct classes of approaches to group key management.
作者 杨军 周贤伟
出处 《电子与信息学报》 EI CSCD 北大核心 2008年第6期1457-1461,共5页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60573050)资助课题
关键词 安全多播 组密钥管理 “1影响n”问题 后向/前向保密性 抗串谋性 Secure multicasting Group Key Management(GKM) "l-affects-n" problem Backward Secrecy(BS) /Forward Secrecy(FS) Non-Collusion(NC)
  • 相关文献

参考文献12

  • 1Challal Y, Bouabdallah A, and Seba H. A taxonomy of group key management protocols: issues and solutions [J]. Transactions on Engineering, Computing and Technology, 2005, 6(2): 5-17. 被引量:1
  • 2Hardjono T and Dondeti L R. Multicast and Group Security[M]. Norwood, MA: Artech House, INC., 2003: 5-12, 27, 29, 94, 104, 107-108, 136-141. 被引量:1
  • 3Kim Y, Perrig A, and Tsudik G. Group key agreement efficient in communication[J]. IEEE Trans. on Computers, 2004, 53(7): 905-921. 被引量:1
  • 4MENEZES AJ, VAN OORSCHOT PC, VANSTONE SA.应用密码学手册[M].胡磊,王鹏,译.北京:电子工业出版社,2005. 被引量:39
  • 5Mu Y and Varadharajan V. Robust and secure broadcasting [C]. In: INDOCRYPT 2001, Springer-Verlag Berlin Heidelberg, 2001, LNCS 2247: 223-231. 被引量:1
  • 6Chaddoud G and Varadharajan V. Efficient secure group management for SSM[C]. In: 2004 IEEE International Conference on Communications, Piscataway, NJ, USA, 2004: 1436-1440. 被引量:1
  • 7杨军,周贤伟,覃伯平.对一种基于公钥加密算法的组密钥管理方案的密码分析[J].计算机科学,2006,33(7):134-137. 被引量:2
  • 8谭作文,刘卓军,肖红光.一个安全公钥广播加密方案(英文)[J].软件学报,2005,16(7):1333-1343. 被引量:10
  • 9Mao Wenbo.现代密码学理论与实践[M].北京:电子工业出版社,2004. 被引量:14
  • 10潘承洞,潘承彪著..初等数论 第2版[M].北京:北京大学出版社,2003:592.

二级参考文献30

  • 1Rafaeli S, Hutchison D. A Survey of Key Management for Secure Group Communication [J]. ACM Computing Survey, 2003, 35(3): 309-329 被引量:1
  • 2Dondeti L R, Mukherjee S, Samal A. Scalable Secure One-to-Many Group Communication Using Dual Encryption [J]. Computer Communications,2000,23(7): 1681-1701 被引量:1
  • 3Hardjono T, Dondeti L R. Muhicast and Group Security [M].Norwood, MA: Artech House, INC, 2003 被引量:1
  • 4Yi M, Varadharajan V, Zhao W. A Robust and Secure Broadcasting Scheme [C]. Proceedings of IndoCrypt ' 2001, Lecture Notesin Computer Science, Springer Verlag LNCS Series, 2001 被引量:1
  • 5Stinson DR著.密码学原理与实践(第二版).冯登国,译[M].北京:电子工业出版社,2003 被引量:1
  • 6Menezes A J,van Oorschot P,Vanstone S. Handbook of Applied Cryptography [M]. Boca Raton: CRC Press, 1997 被引量:1
  • 7Lenstra A K. Computational Methods in Public Key Cryptography [M]. In: Niedrreiter H. ed. Coding Theory and Cryptology,Singapore University Press and World Scientific Publishing Co Pte Ltd,2002 被引量:1
  • 8Chaddoud G, Varadharajan V. Efficient secure group management for SSM [C]. In: 2004 IEEE International Conference on Communications(Paris, France, 20-24 June 2004), Piscataway, NJ, USA,2004. 1436-1440 被引量:1
  • 9Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPT0'93. LNCS 773, Berlin, Heidelberg: Springer-Verlag, 1994. 480-491. 被引量:1
  • 10Graray JA, Staddon J, Wool A. Longlived broadcast encryption. In: Bellare M, ed. Advances in Cryptology-CRYPTO 2000. LNCS 1880, Berlin, Heidelberg: Springer-Verlag, 2000. 333-352. 被引量:1

共引文献60

同被引文献30

  • 1蒋小刚,周贤伟,郑连存,杨军.TGDH协议的分析与实现[J].计算技术与自动化,2005,24(3):66-68. 被引量:1
  • 2魏楚元,李陶深,王高才.基于代理的分布式大型动态组播密钥管理协议[J].计算机工程与应用,2007,43(7):155-159. 被引量:3
  • 3Merkle R C and Hellman M E. Hiding information and signatures in trapdoor knapsacks[J]. IEEE Transactions on Information Theory, 1978, 24(5): 525-530. 被引量:1
  • 4Murakami Y and Nasako T. A new trapdoor in knapsack public-key cryptosystem with two sequences as the public key[C]. The Third International Conference on Convergence and Hybrid Information Technology-ICCIT 2008, Busan, Korea 2008: 357-362. 被引量:1
  • 5Su P and Tsai C. New cryptosystems design based on hybrid-mode problems[J]. Computers and Electrical Engineering, 2009, 35(3): 478-484. 被引量:1
  • 6Hwang M, Lee C, and Tzeng S. A new knapsack public-key cryptosystem based on permutation combination algorithm[J]. International Journal of Applied Mathematics and Computer Sciences, 2009, 5(1): 33-38. 被引量:1
  • 7Coster M J, Joux A, and LaMacehia B A, et al.. Improved low-density subset sum algorithms[J]. Computational Complexity, 1992, 2(2): 111-128. 被引量:1
  • 8Lagarias J C. Knapsack public key cryptosystems and Diophantine approximation[C]. Advances in Cryptology- CRYPTO 1983, New York: Plenum, 1984: 3-23. 被引量:1
  • 9Nguyen P and Stern J. Merkle-Hellman revisited: a cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations[C]. Advances in Cryptology-Crypto 1997 Berlin: Springer-Verlag, 1997, LNCS 1294: 198-212. 被引量:1
  • 10Brickell E F and Odlyzko A M. Cryptanalysis: A survey of recent results[C]. Contemporary Cryptology, The Science of Information Integrity, New York, IEEE Press, 1992: 501-540. 被引量:1

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部