计算机科学 ›› 2015, Vol. 42 ›› Issue (8): 190-193.

• 信息安全 • 上一篇    下一篇

独立群密钥更新模型研究

周健,孙丽艳   

  1. 安徽财经大学管理科学与工程学院 蚌埠233041;北京邮电大学电子工程学院 北京100083,安徽财经大学管理科学与工程学院 蚌埠233041
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金项目(61402001),安徽省高等学校自然基金资助

Research on Independence Rekey Model for Group Key Management

ZHOU Jian and SUN Li-yan   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对群组密钥更新中非更新成员参与共享密钥计算增加交互延时的问题,提出了一种独立密钥更新模型,通过门限密钥共享秘密乘积机制和双线性对设计一种独立群组密钥管理方案,群组成员具有满足密钥独立性的解密密钥。公开加密密钥更新不会破坏非更新成员解密密钥的有效性,使得非更新成员不参与密钥加入/退出操作,减少密钥更新延时和计算开销,符合独立密钥更新模型,适用于计算和延时受限的无线网络场景。

关键词: 群组密钥管理,密钥更新,密钥独立性,更新延时

Abstract: In group key management,much time is expended in rekeying due to non update members taking part in rekeying to distribute key material.To solve the problem,a novel independence rekeying model was presented,and then an independence group key management was designed based on bilinear pairing and shared production of threshold cryptography,which meets key independence and all non update members don’t participate in rekeying for key joining/lea-ving operation.The fresh public encryption key cannot break the validity of secret decryption keys belonging to non update members.Therefore,the rekeying delay time and computation cost of proposed scheme are reduced efficiently.It also meets the independence rekeying model logically,moreover the scheme is suitable to wireless networks whose time delay and computation are limited strictly.

Key words: Group key management,Rekeying,Key independence,Rekeying time delay

[1] Akyildiz I F,Xudong W.A survey on wireless mesh networks [J].IEEE Communications Magazine,2005,43(9):23-30
[2] Yihchun H,Perrig A.A survey of secure wireless ad hoc routing [J].IEEE Security and Privacy,2004,2(3):28-39
[3] 李先贤,怀进鹏,刘旭东.群密钥分配的动态安全性及其方案[J].计算机学报,2002,25(4):337-336 Li Xian-xian,Huai Jin-peng,Liu Xu-dong.Dynamic Security of group key Distribution and its Solutions[J].Chinese Journal of Computers,2002,5(4):337-345
[4] Johann M,Dawoud D,Stephen M.A survey on peer-to-peer key management for mobile ad hoc networks [J].ACM Computing Surveys,2007,39(1):1-46
[5] Yacine C,Hamida S.Group Key Management Protocols:A Novel Taxonomy [J].International Journal of Information Technology,2005,2(2):105-119
[6] Steiner M,Tsudik G,Waidner M.Diffie-Hellman Key Agree-ment Protocol with Key Confirmation [C]∥Proceedings of Indocrypt 2000.LNCS 1977,Springer-Verlag,2000:237-249
[7] Burmester M,Desmedt Y.A Secure and Efficient ConferenceKey Distribution System [C]∥Proceedings of Eurocrypt 1994.LNCS 950,Spring-Verlag,1995:275-286
[8] Steer D,Strawczynski L L,Diffie W,et al.A Secure Audio Teleconference System[C]∥CRYPTO’88.1988:520-528
[9] Kim Y,Perrig A,Tsudik G.Communication-Efficient group Key Agreement [C]∥IFIP SEC.June 2001
[10] Kim Y,Perrig A,Tsudik G.Tree-based group key agreement[J].ACM Transactions on Information System Security,2004,7(1):60-96
[11] L Li-jun,Manulis M.Tree-based group key agreement frame-work for mobile Ad-Hoc networks [J].Future Generation Computer Systems,2007,3(16):787-803
[12] Kim Y,Perrig A,Tsudik G.Simple and fault-tolerant Key Agreement for Dynamic Collaborative Groups [C]∥7th ACM Conference on Computer and Communications Security.2000:235-244
[13] Abdullatif S,Melek ,Refik M.Local key management in opportunistic networks[J].International Journal of Communication Networks and Distributed Systems,2012,9(1/2):97-116
[14] Chiou G H,Chen W T.Secure Broadcast using Secure Lock [J].IEEE Transactions on Software Engineering,1989,15(8):929-934
[15] Kurosawa K.Multi-recipient public-key encryption with shor-tened ciphetext[C]∥Proceedings of 5th International Workshop on Practice and Theory in Public Key Cryptosystem.Paris,France,2002:48-63
[16] Liao P,Hui X L,P Qing-qi,et al.A Public Key Encryption Scheme with One-Encryption and Multi-Decryption[J].Chinese Journal of Computers,2012,5(5):1059-1067
[17] Abdel A K.Cryptanalysis of a Polynomial-based Key Management Scheme for Secure Group Communication[J].InternationalJournal of Network Security,2013,5(1):68-70
[18] W Qian-hong,Yi M,Willy S,et al.Asymmetric Group Key Agreement[C]∥Proceedings of the 28th Annual International Conference on Advances in Cryptology:the Theory and Applications of Cryptographic Techniques(EUROCRYPT’09).2009:153-170
[19] Lei Z,W Qian-hong,Bo Q,et al.Asymmetric group key agreement protocol for open networks and its application to broadcast encryption[J].Computer Networks,2011,5(15):3246-3255
[20] Alkalai L.An overview of flight computer technologies for future NASA space exploration missions[J].Acta Astronautica,2003,52(9-12):857-867
[21] Cassady R J,Frisbee R H,Gilland J H,et al.Recent advances in nuclear powered electric propulsion for space exploration[J].Energy Conversion and Management,2008,49(3):412-435
[22] Davarian F,Popken L.Technical advances in deep space communications and tracking[J].Proceedings of the IEEE,2007,5(11):2108-2110
[23] 熊永平,孙利民,牛建伟,等.机会网络[J].软件学报,2009,20(1):124-137 Xiong Yong-ping,Sun Li-min,Niu Jian-wei,et al.Opportunistic Networks[J].Journal of Software,2009,0(1):124-137

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!