Advanced Search
Volume 30 Issue 6
Dec.  2010
Turn off MathJax
Article Contents
Yang Jun, Zhou Xian-wei. A Two-level Decentralized Group Key Management Scheme Based on the Discrete Logarithm Problem[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1457-1461. doi: 10.3724/SP.J.1146.2006.01836
Citation: Yang Jun, Zhou Xian-wei. A Two-level Decentralized Group Key Management Scheme Based on the Discrete Logarithm Problem[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1457-1461. doi: 10.3724/SP.J.1146.2006.01836

A Two-level Decentralized Group Key Management Scheme Based on the Discrete Logarithm Problem

doi: 10.3724/SP.J.1146.2006.01836
  • Received Date: 2006-11-20
  • Rev Recd Date: 2007-05-28
  • Publish Date: 2008-06-19
  • Based on a public-key encryption algorithm with multiple decryption keys mapping to one encryption key , a group re-keying protocol is proposed and then combining the protocol with the LKH algorithm a two-level decentralized group key management scheme is designed for Source Specific Multicast(SSM). Its backward secrecy, forward secrecy and non-collusion with high probability are demonstrated. The performance bottleneck of sub-group managers and the 1-affects-n problem existing universally in the common group key approach are miti-gated through the long-livedness of private keys in the upper level and the method of key translation. The analysis shows that adopting a hybrid cryptosystem the novel scheme possesses some advantages of two distinct classes of approaches to group key management.
  • loading
  • Challal Y, Bouabdallah A, and Seba H. A taxonomy of groupkey management protocols: issues and solutions [J]. Transactionson Engineering, Computing and Technology, 2005,6(2): 5-17.[2]Hardjono T and Dondeti L R. Multicast and Group Security[M]. Norwood, MA: Artech House, INC., 2003: 5-12, 27,29, 94, 104, 107-108, 136-141.[3]Kim Y, Perrig A, and Tsudik G. Group key agreementefficient in communication[J].IEEE Trans. on Computers.2004, 53(7):905-921[4]Menezes A J, Oorschot P van, and Vanstone S 著,胡磊等译.应用密码学手册[M]. 北京:电子工业出版社, 2005: 56, 99, 147,267-268, 529, 534, 542-543, 556.Menezes A J, Oorschot P Van, and Vanstone S, translated byHu Lei et al.. Handbook of Applied Cryptography[M]. Beijing:Publishing House of Electronics Industry, 2005.[5]Mu Y and Varadharajan V. Robust and secure broadcasting[C]. In: INDOCRYPT 2001, Springer-Verlag Berlin Heidelberg,2001, LNCS 2247: 223-231.[6]Chaddoud G and Varadharajan V. Efficient secure groupmanagement for SSM[C]. In: 2004 IEEE International Conferenceon Communications, Piscataway, NJ, USA, 2004:1436-1440.[7]杨军,周贤伟,覃伯平. 对一种基于公钥加密算法的组密钥管理方案的密码分析[J]. 计算机科学, 2006, 33(7): 134-137.Yang Jun, Zhou Xian-wei, and Qin Bo-ping. Cryptanalysis ofa group key management scheme based on a public-key encryptionalgorithm[J]. Computer Science, 2006, 33(7):134-137.[8]谭作文,刘卓军,肖红光. 一个安全公钥广播加密方案[J]. 软件学报, 2005, 16(7): 1333-1343.Tan Zuo-wen, Liu Zhu-jun, and Xiao Hong-guang. A fullypublic key tracing and revocation scheme provably secureagainst adaptive adversary. Journal of Software, 2005, 16(7):1333-1343.[9]Mao W 著,王继林等译. 现代密码学理论与实践[M]. 北京:电子工业出版社, 2004: 34, 41, 173, 188, 215.Mao W, translated by Wang Ji-lin et al.. Modern Cryptography:Theory and Practice[M]. Beijing: Publishing House ofElectronics Industry, 2004: 34, 41, 173, 188, 215.[10]潘承洞,潘承彪. 初等数论(第二版)[M]. 北京:北京大学出版社, 2003: 143, 181-182.Pan Cheng-dong and Pan Cheng-biao. Elementary NumberTheory(Second Edition)[M]. Beijing: Peking University Press,2003: 143, 181-182.[11]Steel G and Bundy A. Attacking group multicast key managementprotocols using coral[J].Electronic Notes in TheoreticalComputer Science.2005, 125(1):125-144[12]Aslan H K. Two-level controllers hierarchy for a scalable anddistributed multicast security protocol[J].Computers Security.2005, 24(5):399-408
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3464) PDF downloads(796) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return