首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种安全的分布式会议密钥分配方案及其实现
引用本文:郭渊博,马建峰.一种安全的分布式会议密钥分配方案及其实现[J].系统工程与电子技术,2005,27(3):511-515.
作者姓名:郭渊博  马建峰
作者单位:1. 解放军信息工程大学电子技术学院,河南,郑州,450004;西安电子科技大学教育部计算机网络与信息安全重点实验室,陕西,西安,710071
2. 解放军信息工程大学电子技术学院,河南,郑州,450004
基金项目:国家自然科学基金重大研究计划(90204012),国家"863"高技术研究发展计划(2002AA143021),教育部优秀青年教师资助计划,教育部科学技术重点研究基金资助课题
摘    要:结合基于可验证秘密共享技术的安全多方计算和知识证明,提出了一种计算安全的分布式会议密钥分配方案,该方案具有结构简单、安全性强等特点。分析表明,即使方案中实施密钥分配的服务器组中有部分服务器为入侵者成功控制,会议的所有诚实用户仍可得到关于会议的正确的密钥;在Diffie HellmenDecisional问题假设下,任何窃听者均无法得到有关会议密钥的任何信息,在随机Oracle模型下,主动攻击者也无法成功进行任何假冒。实验表明,该方案效率较高,有着较强的实用性。

关 键 词:会议密钥分配  容错  计算安全  可验证秘密共享  知识证明
文章编号:1001-506X(2005)03-511-05
修稿时间:2004年5月20日

New scheme of a distributed conference key distribution and its implementation
GUO Yuan-bo,MA Jian-feng.New scheme of a distributed conference key distribution and its implementation[J].System Engineering and Electronics,2005,27(3):511-515.
Authors:GUO Yuan-bo  MA Jian-feng
Institution:GUO Yuan-bo~
Abstract:A distributed conference key distribution system is introduced. The system utilizes secure multi-party computation scheme by virtue of Feldman's (t+1, n) VSS to perform the conference key computation such that a key can be obtained in a distributed fashion in which any key of servers is required to perform the computation. By runing the protocal, every honest user of a given conference can get a common key, even if a minority of servers malfunction or misbehave. This scheme does not rely on any unproven cryptographic assumptions or on the availability of any tamper -proof hardware. By using zero knowledge proof, any corrupted information and incorrect results can be detected. And by distributing the sensitive security information across several servers and never reconstructing and key at a single location, the compromise of a few servers will not compromise the privacy of any key. The scheme is implemented in a distributed environment. By conducting a number of experiments in the fault-free case and various fault scenarios, it is shown that the scheme is practicable and efficient.
Keywords:conference key distribution  fault-tolerant  computationa security  verifiable secret sharing  knowledge proof
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号