期刊文献+

基于GDH的协商式虚拟动态子群组密钥管理方案

Key agreement scheme based on GDH for virtual dynamic subgroup group
下载PDF
导出
摘要 通常的群组密钥协商方案,一般都针对普通的、静态的群组。基于GDH的协商式虚拟动态子群组密钥管理方案实现了利用原来大群的密钥信息,有效地建立和管理虚拟动态安全子群的方法,与GDH方案相比,减少了很多的数据传输和密钥存储空间。 Key agreement is usually mentioned in general static group. Based on virtual dynamic subgroup, Agreed Virtual Dynamie Subgroup Seheme(AVDSG) was proposed, whieh ean manage the virtual dynamie subgroup by using the key information of the group. Compared with GDH, it ean largely reduee the average eost of re-keying and the number of keys held by each user.
作者 刘文艳
出处 《计算机应用》 CSCD 北大核心 2007年第4期849-851,共3页 journal of Computer Applications
关键词 虚拟群组 密钥协商 动态子群 virtual group key agreement dynamic subgroup
  • 相关文献

参考文献8

  • 1FOSTER I,KESSELMAN C,TUECKE S.The Anatomy of the Grid:Enabling Scalable Virtual Organizations[J].International J.Supercomputer Applications,2001,15(3):200-222.
  • 2WONG CK,GOUDA MG,LAM SS.Secure group communications using key graphs[J].IEEE/ACM Trans Networking,2000,2(8):16 -31.
  • 3STEINER M,TSUDIK G,WAIDRER M.Diffie-Hellman Key Distribution Extended to Group Communication[A].Proceedings of the ACM Conference on Computer and Communications Security[C].1996.31-37.
  • 4DIFFIE W,HELLMAN ME.New directions in cryptography[J].IEEE Transactions Information Theory,1976,22(6):644 -654.
  • 5李先贤,怀进鹏,刘旭东.群密钥分配的动态安全性及其方案[J].计算机学报,2002,25(4):337-345. 被引量:26
  • 6HARNEY H,MUCKENHIRN C.Group Key Management Protocol (GKMP) Architecture,RFC 2094[S].1997.
  • 7STEINER M,TSUDIK G,WAIDRER M.A New Approach to Group Key Agreement[A].IEEE International Conference on Distributed Computing System[C].1998.168-176.
  • 8KIM Y,PERRIG A,TSUDIK G.Tree-based Group Key Agreement[J].ACM TRANS ISS,2004,7(1):60 -96.

二级参考文献13

  • 1[1]Ateniese G, Chevassut D, Hasse D et al. The design of a group key agreement API. In: Proc DARPA Information Survivability Conference and Exposition, SC, USA, 2000. 115-126
  • 2[2]Caronni G, Waldvogel M, Sun D et al. Efficient security for large and dynamic groups. In: Proc the 7th Workshop on Enabling Technologies, (WET ICE'98), Stanford, California, USA,1998. 376-383. http://www.computer.org/ proceedings/wetice/8751/8751toc.htm
  • 3[3]Lakshminath R, Mukherjee S, Sama A. A dual encryption protocol for scalable secure multicasting. In: Proc the 4th IEEE Symposium on Computers and Communications, Red Sea, Egypt, 1999. 2-8
  • 4[4]Gong L, Shacham N. Elements of trusted multicasting. In: Proc IEEE International Conference on Network Protocols, Boston, MA, USA, 1994. 23-30
  • 5[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) Architecture. RFC 2094, 1997
  • 6[6]Blundo C, Santis A D, Herzberg A et al. Perfectly-secure key distribution for dynamic conferences. In: Proc CRYPTO'92, California, USA, 1992. 471-486
  • 7[7]Mayer A, Yung M. Generalized secret sharing and group-key distribution using short keys. In: Proc Compression and Complexity of Sequences 1997, Salerno, Italy, 1998. 30-44
  • 8[8]Chiou G H, Chen W T. Secure broadcasting using the secure lock. IEEE Trans Software Engineering, 1989,15(8): 929-934
  • 9[9]Ballardie T. Scalable Multicast Key Distribution. RFC 1949, 1996
  • 10[10]Dinsmore P T, Balenson D M, Heyman M et al. Policy-based security management for large dynamic groups: An overview of the DCCM project. In: Proc the DARPA Information Survivability Conference & Exposition, SC, USA, 2000. 64-73

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部