首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Ad Hoc中基于双线性对和证书的组密钥管理协议
引用本文:林慕清,徐剑,刘泽超,周福才.Ad Hoc中基于双线性对和证书的组密钥管理协议[J].东北大学学报(自然科学版),2012,33(10):1407-1410,1423.
作者姓名:林慕清  徐剑  刘泽超  周福才
作者单位:1. 东北大学信息科学与工程学院,辽宁沈阳,110819
2. 东北大学信息科学与工程学院,辽宁沈阳110819 东北大学软件学院,辽宁沈阳110819
基金项目:国家高技术研究发展计划项目(2009AA01Z122);辽宁省“百千万人才工程”资助项目(2011921071);沈阳市科技计划项目(F10-205-1-12,F12-277-1-41)
摘    要:针对当前多数分布式组密钥管理协议不能提供密钥认证及不能抵御主动攻击的安全问题,设计了满足认证性的CBPSTR(certificate- owned and bilinear pairing- based STR)协议.该协议采用特殊的三叉密钥树结构,结合STR和TGDH协议并引入证书和双线性对密码体制.CBPSTR协议包括6个子协议:建立多播组、成员加入、成员离开、合并多播组、拆分多播组和更新组密钥.安全性分析表明CBPSTR协议在计算上是安全的.与STR协议进行比较,CBPSTR协议具有较低计算和通信代价.由于具有成员间的认证性,CBPSTR能抵抗中间人攻击、密钥泄漏假冒攻击和未知密钥共享攻...

关 键 词:多播密钥管理  双线性对  证书  CBPSTR  Ad  Hoc  

Group Key Management Protocol Based on Bilinear Pairing and Certificate in Ad Hoc Network
LIN Mu-qing,XU Jian,LIU Ze-chao,ZHOU Fu-cai.Group Key Management Protocol Based on Bilinear Pairing and Certificate in Ad Hoc Network[J].Journal of Northeastern University(Natural Science),2012,33(10):1407-1410,1423.
Authors:LIN Mu-qing  XU Jian  LIU Ze-chao  ZHOU Fu-cai
Institution:1.School of Information Science & Engineering,Northeastern University,Shenyang 110819,China;2.School of Software,Northeastern University,Shenyang 110819,China.)
Abstract:Most of the distributed group key management protocols are not secure against the active attacks without key authentication, so a CBPSTR (certificate-owned and bilinear pairing-based STR) protocol was designed to meet the requirement. Based on the STR and TGDH, the certificate mechanism and bilinear pairing function in elliptic curve with the ternary tree were introduced to propose a novel multicast key management scheme CBPSTR. The CBPSTR protocol included 6 sub protocols (setup protocol, join protocol, leave protocol, merge protocol, partition protocol and refresh protocol). Security analysis showed that the CBPSTR protocol was secure for calculation. Compared with STR, the CBPSTR possessed lower communication and computation cost. Moreover, the CBPSTR could effectively resist man-in-the-middle attack, key-compromise impersonation resilience and unknown key-share resilience. It could be concluded that the CBPSTR protocol was a novel, authentication and efficient distributed key management protocol.
Keywords:multicast key management  bilinear pairing  certificate  CBPSTR(certificate-owned and bilinear pairing-based STR)  Ad Hoc
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《东北大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《东北大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号