[1]丁永平.基于CDS结构的动态安全组播密钥协商方案[J].南京师范大学学报(工程技术版),2007,07(01):068-71.
 Ding Yongping.Key Agreement Scheme for Dynamic Secure Multicast Based on Connected Dominating Set[J].Journal of Nanjing Normal University(Engineering and Technology),2007,07(01):068-71.
点击复制

基于CDS结构的动态安全组播密钥协商方案
分享到:

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

卷:
07卷
期数:
2007年01期
页码:
068-71
栏目:
出版日期:
2007-03-30

文章信息/Info

Title:
Key Agreement Scheme for Dynamic Secure Multicast Based on Connected Dominating Set
作者:
丁永平;
南京师范大学数学与计算机科学学院 江苏南京210097
Author(s):
Ding Yongping
School of Mathematics and Computer Science,Nanjing Normal University,Nanjing 210097,China
关键词:
安全组播 密钥协商 CDS 椭圆曲线密码体制
Keywords:
secure mu lticast key ag reem ent connected dom inating set elliptic curve cryptosystem
分类号:
TN918.1
摘要:
提出了一个应用椭圆曲线密码体制在基于CDS结构的动态安全组播中进行密钥协商的方案.首先采用CDS分组算法对组播组成员进行区域划分,然后应用椭圆曲线密码体制进行各个子组及整个大的组播组的密钥协商.采用CDS结构增加了灵活性,避免了单点故障的产生,提高了组播系统的健壮性.应用椭圆曲线密码体制,有效地减少了密钥程度和密码算法的计算量.具体分析了各个子组和整个大的组播组的密钥协商过程,以及在组成员动态变化时密钥的更新过程,结果表明,所提方案在降低计算和通信代价方面取得了较好的效果,而且满足组播密钥协商的各种安全要求.
Abstract:
H ow to des ign effic ient key agreem ent schem es is a d ifficult problem in dynam ic securem ulticast. In th is pape r, w e propose a nove l key agreem en t schem e using E lliptic Curve Crypto system fo r dynam ic secu re mu lticast based on CDS( Connected Dom inating Set). F irst, we use CDS g roup ing ar ithm etic to partition the mu lticast group m em bers. Then w e apply E lliptic Curve Crypto system to the procedure of key agreem ent of every subg roup and the entire mu lticast group. Adopting the CDS structure not only increases the system ag ility and avo ids producing h itches, but a lso im proves the sy stem haleness. App ly ing E lliptic Curve Crypto system decreases the computation of key agreem en t and cryptography arithm etic. W e a lso analyze the pro cedure of key agreem ent of every subgroup and the entire m ulticast g roup, and the procedure of upda ting of group keys w ith the dynam ic change of group m em bers in detai.l The ana ly sis show s tha t our scheme is not only effic ient in com puta tion and comm un ication, but also sa tisfies the security requ irem ents of mu lticast key agreem ent.

参考文献/References:

[ 1] Berkov its S. H ow to broadcast a secre t[ C ] / / Advances in Crypto logy - EUROCRYPTO ’91. B erlin: Springer-Ver lag, 1991, LNCS 547: 535-541.
[ 2] Boneh D, Gentry C, W ate rs B. Co llus ion resistant broadcast encryption w ith short ciphertex ts and pr ivate keys[ C ] / / Adv ances in Cryptology-CRYPTO ’05. Ber lin: Springer-Verlag, 2005, LNCS 3621: 258-275.
[ 3] H ankerson D, M enezes A, V anstone S. Gu ide to E lliptic Curve C ryptography [M ]. New York: Springer-V erlag, 2004: 75- 198.
[ 4] M enezes A, Oorschot P, Vanstone S. H andbook of Applied Cryptography[M ]. New York: CRC Press, 1997: 425-488.
[ 5] Ste inerM, Tsudik G, W a idnerM. CLIQUES: A new approach to group key ag reem ent[ C] / / Proceed ings o f 18 th Inte rnational Conference on D istributed Com puting System s. Amsterdam, New York: IEEE Computer Soc ie ty Press, 1998: 380-387.
[ 6] Becker K. Communication com plex ity o f group key distribution[ C] / / Proceed ing s o f 5th ACM Conference on Computer and Communications Secur ity. New York: ACM Press, 1998: 1-6.
[ 7] K im Y, Perrig A, Tsudik G. Tree-based group key agreem en t[ J]. ACM Transactions on Inform ation and System Security( T ISSEC), 2004, 7( 1): 60-96.
[ 8] W an P, A lzoubi K, Frieder O. Distributed construction of connected dom inating se t in w ire less ad hoc netwo rks[ J]. M ob ile Netwo rks and Applications, 2004, 9( 2): 141-149.
[ 9] A lzoub iK, W an P, Frieder O. M essage-optima l connected-dom inating-set construc tion for routing in m obile ad hoc netwo rks [ C] / / Proceed ing s o f 3rd ACM Internationa l Symposium M obile AdH o cNetw ork ing and Computing. N ew Yo rk: ACM Press, 2002: 157-164.
[ 10] Zhang F, W ang Y. Study and advance o f hyper-e lliptic curves cryp to system s[ J]. Ac taE lectronica S inica, 2002, 30( 1): 126- 131.
[ 11] Oorschot P, W ienerM. Para llel co llision search w ith cryptanalytic applica tions[ J]. Journa l of Crypto logy, 1999, 12( 1): 1- 28.

备注/Memo

备注/Memo:
作者简介: 丁永平( 1976-) , 女, 助理实验员, 主要从事网络安全方面的教学与研究. E-m ail:d ingyongp ing@ n jnu. edu. cn
更新日期/Last Update: 2013-04-29