全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

运用PRF和XOR运算的安全组播密钥更新改进方案

DOI: 10.13190/jbupt.200801.92.064, PP. 92-96

Keywords: 安全组播,密钥管理,逻辑密钥层,伪随机函数,异或运算

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出了一种基于pseudorandomfunction(PRF)和exclusiveOR(XOR)运算的组播密钥更新改进算法,全部更新密钥通过PRF计算生成,并且密钥间保持一定的相关性;组播的密钥更新报文通过PRF和XOR共同计算生成,替代了常规的加解密运算.除保证安全性之外,显著降低了通信开销、计算开销和存储开销.Linux下原型验证系统的仿真结果表明,该算法在一定程度上提高了安全组播密钥管理的性能.

References

[1]  Wong C K, Gouda M, Lam S S. Secure group communications using key graphs[J]. IEEE/ACM Transactions on Networking, 2000, 8(1): 16-30.
[2]  Dierks T, Rescorla E. RFC4346—2006, The transport layer security (TLS) protocol version 1.1[S]. USA: IETF, 2006: 24-51.
[3]  Waldvogel M, Caronni G, Sun D. The versaKey framework: versatile group key management[J]. IEEE Journal on Selected Areas in Communications, 1999, 17(9): 1614-1631.
[4]  Canetti R, Garay J, Itkis G. Multicast security: a taxonomy and some efficient construction//Proceedings of the INFOCOM. New York: IEEE Press, 1999: 708-716.
[5]  Rafaeli S, Mathy L, Hutchison D. Draft-rafaeli-lkh2-00-2002, LKH+2: An improvement on the LKH+ algorithm for removal operations[S]. USA: IETF, 2002: 8-11.
[6]  Sherman A T, McGrew D A. Key establishment in large dynamic groups using one-way function trees[J]. IEEE Transactions on Software Engineering, 2003, 29(5): 444-458.
[7]  Duma C, Shahmehri N, Lambrix P. A hybrid key tree scheme for multicast to balance security and efficiency requirements//Proceedings of the WETICE'03. Linz: IEEE Press, 2003: 208-213.
[8]  Ghanem S M, Abdel-Wahab H. A simple XOR-based technique for distributing group key in secure multicasting//Proceedings of the ISCC 2000. Antibes: IEEE Press, 2000: 166-171.
[9]  Lin Jenchiun, Tzeng Chienhua, Lai Feipei. Optimizing centralized secure group communications with binary key tree recomposition//Proceedings of the AINA'04. Fukuoka: IEEE Press, 2004: 202-207.
[10]  Zhu Wentao. Optimizing the tree structure in secure multicast key management[J]. Communications Letters, IEEE, 2005, 9(5): 477-479.
[11]  Onen M, Molva R. Reliable group rekeying with a customer perspective//Proceedings of the GLOBECOM'04. Dallas: IEEE Press, 2004: 2072-2076.
[12]  Bruce Schneier. Applied cryptography[M]. Second Edition. USA: John Wiley & Sons, Inc, 1996: 359-383.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133