Computer Science ›› 2013, Vol. 40 ›› Issue (10): 114-118.

Previous Articles     Next Articles

Wireless AD-hoc Network Group Key Management Scheme Based on Paillier Homomorphic

HE Wen-cai,DU Min,LIU Pei-he,CHEN Zhi-wei and ZHENG Zhao   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Based on the Paillier homomorphic cryptography system,we presented a safe and effective homomorphism key management scheme.For the sake of the collusive attack,forward secrecy and backward secrecy,our scheme is suitable for group-oriented and rapid variable topology of wireless mobile Ad-hoc network.The homomorphism operations on the ciphertext improve the efficiency of renewing the group key when the external nodes join the group and the internal members leave the group.The security and correctness of our scheme were discussed in this paper.Compared with other approaches,this new scheme has less interaction frequency,a smaller communication and memory cost and a stronger security.

Key words: Wireless Ad-hoc networks,Paillier,Homomorphic encryption,Group key agreement

[1] 崔国华,郑明辉.移动自组网络中的分布式安全组密钥管理[J].小型微型计算机系统,2007,7(6):299-306
[2] Khalili A,Katz J,Arbaugh W A.Toward secure key distribution in truly Ad-Hoc networks[C]∥Proceedings of The Symposium on Applications and the Internet Workshops.Los Alamitos:IEEE Computer Society Press,2003:342-346
[3] Wong C K,Gouda M,Lam S S.Secure group Communicationsusing key graphs[J].IEEE ACM Trans Networking,2000,8(1):16-30
[4] Balenson D,McGrew,Sherma A.Keymanagement for large dy-namic groups:one-way function trees and amortized initialization[Z].Internet-Draft Internet Engineering Task Force,Mar.1999
[5] Tseng Y-M.A scalable key-management scheme with minimi-zing key storage for secure group communications[J].International Journal of Network Management,2003,3(6):419-425
[6] 胡焰智,马大玮,等.基于同态加密机制的无线群组密钥分配协议[J].计算机工程,2009(4):158-160
[7] Domingo-Ferrer J,Herrera-Joancomarti J.A new privacy homomorphism and application[J].Information Processing Letters,1996,60(5):227-282
[8] Rivest R L,Adleman L,Dertouzos M L.On data banks and privacy homomorphisms[A]∥De-millo R A et al.Foundations of Secure Computation[C].New Youk:Academic Press,1978:169-179
[9] Sander T,Tschudin C.Protecting Mobile Agents Against Malicious Hosts[C]∥the Proceedings of the 1998IEEE Symposium of Research in Security and Privacy.Oakland,1998
[10] 冯涛,马建峰,等.一种新的基于椭圆曲线密码体制的Ad hoc组密钥管理方案[J].电子学报,2009,37(5):918-924
[11] Catalano D,Gennaro R,Grahamn H.The bit security of paillier encryption scheme and its application[C]∥Advances in Crypto-logyEurocrypt’01,Aarhus,Denmark,LNCS2045.Berlin:Springer-Verlag,2001:229-243
[12] Cramer R,Shoup V.Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption[C]∥Advances in Cryptology-Eurocrypt’02,Amsterdam Netherlands,LNCS 2332.Berlin:SpringerVerlag,2002:45-94
[13] 曹帅,张串绒,等.具有抗合谋攻击能力的自治愈群组密钥管理方案[J].计算机应用,2011,31(10):2692-2777
[14] Paillier P.Public-key cryptosystems based on Composite degree residuosity classes[C]∥Proceedings of Eurocyypt’99,Prague,Czech Republic,LANCS 1592.Berlin:SpringerVerlag,1999:223-228
[15] 武涛,郑雪峰,等.一种高效的组密钥分发协议[J].小型微型计算机系统,2010,31(10):2030-2033

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!