检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:林慕清[1] 徐剑[1,2] 刘泽超[1] 周福才[2]
机构地区:[1]东北大学信息科学与工程学院,辽宁沈阳110819 [2]东北大学软件学院,辽宁沈阳110819
出 处:《东北大学学报(自然科学版)》2012年第10期1407-1410,1423,共5页Journal of Northeastern University(Natural Science)
基 金:国家高技术研究发展计划项目(2009AA01Z122);辽宁省"百千万人才工程"资助项目(2011921071);沈阳市科技计划项目(F10-205-1-12;F12-277-1-41)
摘 要:针对当前多数分布式组密钥管理协议不能提供密钥认证及不能抵御主动攻击的安全问题,设计了满足认证性的CBPSTR(certificate- owned and bilinear pairing- based STR)协议.该协议采用特殊的三叉密钥树结构,结合STR和TGDH协议并引入证书和双线性对密码体制.CBPSTR协议包括6个子协议:建立多播组、成员加入、成员离开、合并多播组、拆分多播组和更新组密钥.安全性分析表明CBPSTR协议在计算上是安全的.与STR协议进行比较,CBPSTR协议具有较低计算和通信代价.由于具有成员间的认证性,CBPSTR能抵抗中间人攻击、密钥泄漏假冒攻击和未知密钥共享攻击,是一种具有认证性的高效分布式组密钥管理协议.Most of the distributed group key management protocols are not secure against the active attacks without key authentication, so a CBPSTR(certificate-owned and bilinear pairing based STR) protocol was designed to meet the requirement. Based on the STR and TGDH, the certificate mechanism and bilinear pairing function in elliptic curve with the ternary tree were introduced to propose a novel multicast key management scheme CBPSTR. The CBPSTR protocol included 6 sub protocols (setup protocol, join protocol, leave protocol, merge protocol, partition protocol and refresh protocol). Security analysis showed that the CBPSTR protocol was secure for calculation. Compared with STR, the CBPSTR possessed lower communication and computation cost. Moreover, the CBPSTR could effectively resist man-in-the-middle attack, key-compromise impersonation resilience and unknown key-share resilience. It could be concluded that the CBPSTR protocol was a novel, authentication and efficient distributed key management protocol.
关 键 词:多播密钥管理 双线性对 证书 CBPSTR AD HOC
分 类 号:TP309.2[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.41