高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于离散对数问题的两层分散式组密钥管理方案

杨军 周贤伟

杨军, 周贤伟. 基于离散对数问题的两层分散式组密钥管理方案[J]. 电子与信息学报, 2008, 30(6): 1457-1461. doi: 10.3724/SP.J.1146.2006.01836
引用本文: 杨军, 周贤伟. 基于离散对数问题的两层分散式组密钥管理方案[J]. 电子与信息学报, 2008, 30(6): 1457-1461. doi: 10.3724/SP.J.1146.2006.01836
Yang Jun, Zhou Xian-wei. A Two-level Decentralized Group Key Management Scheme Based on the Discrete Logarithm Problem[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1457-1461. doi: 10.3724/SP.J.1146.2006.01836
Citation: Yang Jun, Zhou Xian-wei. A Two-level Decentralized Group Key Management Scheme Based on the Discrete Logarithm Problem[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1457-1461. doi: 10.3724/SP.J.1146.2006.01836

基于离散对数问题的两层分散式组密钥管理方案

doi: 10.3724/SP.J.1146.2006.01836
基金项目: 

国家自然科学基金(60573050)资助课题

A Two-level Decentralized Group Key Management Scheme Based on the Discrete Logarithm Problem

  • 摘要: 该文基于多个解密密钥映射到同一加密密钥的公钥加密算法提出一个组密钥更新协议,结合LKH算法为特定源多播模型设计一个两层分散式组密钥管理方案。证明它具有后向保密性、高概率的前向保密性和抗串谋性。通过上层私钥的长寿性和密钥转换的方法来缓解子组管理者的性能瓶颈及共享组密钥方法中普遍存在的1影响n问题。分析表明,采用混合密码体制的新方案在一定程度上兼备了两类不同组密钥管理方法的优势。
  • Challal Y, Bouabdallah A, and Seba H. A taxonomy of groupkey management protocols: issues and solutions [J]. Transactionson Engineering, Computing and Technology, 2005,6(2): 5-17.[2]Hardjono T and Dondeti L R. Multicast and Group Security[M]. Norwood, MA: Artech House, INC., 2003: 5-12, 27,29, 94, 104, 107-108, 136-141.[3]Kim Y, Perrig A, and Tsudik G. Group key agreementefficient in communication[J].IEEE Trans. on Computers.2004, 53(7):905-921[4]Menezes A J, Oorschot P van, and Vanstone S 著,胡磊等译.应用密码学手册[M]. 北京:电子工业出版社, 2005: 56, 99, 147,267-268, 529, 534, 542-543, 556.Menezes A J, Oorschot P Van, and Vanstone S, translated byHu Lei et al.. Handbook of Applied Cryptography[M]. Beijing:Publishing House of Electronics Industry, 2005.[5]Mu Y and Varadharajan V. Robust and secure broadcasting[C]. In: INDOCRYPT 2001, Springer-Verlag Berlin Heidelberg,2001, LNCS 2247: 223-231.[6]Chaddoud G and Varadharajan V. Efficient secure groupmanagement for SSM[C]. In: 2004 IEEE International Conferenceon Communications, Piscataway, NJ, USA, 2004:1436-1440.[7]杨军,周贤伟,覃伯平. 对一种基于公钥加密算法的组密钥管理方案的密码分析[J]. 计算机科学, 2006, 33(7): 134-137.Yang Jun, Zhou Xian-wei, and Qin Bo-ping. Cryptanalysis ofa group key management scheme based on a public-key encryptionalgorithm[J]. Computer Science, 2006, 33(7):134-137.[8]谭作文,刘卓军,肖红光. 一个安全公钥广播加密方案[J]. 软件学报, 2005, 16(7): 1333-1343.Tan Zuo-wen, Liu Zhu-jun, and Xiao Hong-guang. A fullypublic key tracing and revocation scheme provably secureagainst adaptive adversary. Journal of Software, 2005, 16(7):1333-1343.[9]Mao W 著,王继林等译. 现代密码学理论与实践[M]. 北京:电子工业出版社, 2004: 34, 41, 173, 188, 215.Mao W, translated by Wang Ji-lin et al.. Modern Cryptography:Theory and Practice[M]. Beijing: Publishing House ofElectronics Industry, 2004: 34, 41, 173, 188, 215.[10]潘承洞,潘承彪. 初等数论(第二版)[M]. 北京:北京大学出版社, 2003: 143, 181-182.Pan Cheng-dong and Pan Cheng-biao. Elementary NumberTheory(Second Edition)[M]. Beijing: Peking University Press,2003: 143, 181-182.[11]Steel G and Bundy A. Attacking group multicast key managementprotocols using coral[J].Electronic Notes in TheoreticalComputer Science.2005, 125(1):125-144[12]Aslan H K. Two-level controllers hierarchy for a scalable anddistributed multicast security protocol[J].Computers Security.2005, 24(5):399-408
  • 加载中
计量
  • 文章访问数:  3464
  • HTML全文浏览量:  102
  • PDF下载量:  796
  • 被引次数: 0
出版历程
  • 收稿日期:  2006-11-20
  • 修回日期:  2007-05-28
  • 刊出日期:  2008-06-19

目录

    /

    返回文章
    返回