一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內容
驗證碼

安全組播密鑰管理的層次結構研究

朱文濤 熊繼平 李津生 洪佩琳

朱文濤, 熊繼平, 李津生, 洪佩琳. 安全組播密鑰管理的層次結構研究[J]. 電子與信息學報, 2004, 26(1): 7-13.
引用本文: 朱文濤, 熊繼平, 李津生, 洪佩琳. 安全組播密鑰管理的層次結構研究[J]. 電子與信息學報, 2004, 26(1): 7-13.
Zhu Wen-tao, Xiong Ji-ping, Li Jin-sheng, Hong Pci-lin. Hierarchical Key Management in Secure Multicast[J]. Journal of Electronics & Information Technology, 2004, 26(1): 7-13.
Citation: Zhu Wen-tao, Xiong Ji-ping, Li Jin-sheng, Hong Pci-lin. Hierarchical Key Management in Secure Multicast[J]. Journal of Electronics & Information Technology, 2004, 26(1): 7-13.

安全組播密鑰管理的層次結構研究

Hierarchical Key Management in Secure Multicast

  • 摘要: 組播是面向組接收者的有效數據通信方式,其重要性正日益突出。組管理協議(IGMP)不提供成員接入控制。為保護通信機密性,安全組播使用不為組外成員所知的業(yè)務密鑰來加密數據,并隨組成員關系變化而動態(tài)更新。密鑰管理成為安全組播研究的核心問題。為支持大規(guī)模安全組播,引入了邏輯密鑰層次結構,以使密鑰管理具有可擴展性。在對邏輯密鑰層次作具體分析的基礎上,本文就密鑰樹最優(yōu)結構問題作了理論上的探討,并取得了與實驗一致的結論。
  • Fenner W. Internet group management protocol, Version 2. IETF RFC2236, November 1997.[2]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol,Version 3. IETF RFC3376, October 2002.[3]Krusus P S, Macker J P. Techniques and issues in multicast security. Military Communications Conference, Boston, USA, 1998, Vol.3: 1028-1032.[4]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, http.∥www.securemulticast.org/smug-drafts.htm, August 2000.[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) architecture. IETF RFC2094, July 1997.[6]Mingyan Li, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint[J].IEEE Communications Letters.2002, 6(3):108-110[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. IEEE INFOCOM 2001, Anchorage, USA, 2001, Vol.1: 422-431.[8]Poovendran R, Baras J S. An information-theoretic approach for design and analysis of rootedtree-based multicast key management schemes[J].IEEE Trans. on Information Theory.2001, 47(7):2824-2834[9]Guang-Huei Chiou, Wen-Tsuen Chen. Secure broadcasting using the secure lock[J].IEEE Trans.on Software Engineering.1989, 15(8):929-934[10]Kuen-Pin Wu, Shanq-Jang Ruan, Feipei Lai, Chih-Kuang Tseng. On key distribution in secure multicasting. 25th Annual IEEE Conference on Local Computer Networks, Tampa, USA, 2000:208-212.[11]Trappe W, Jie Song, Poovendran R, Liu K J R. Key distribution for secure multimedia multicasts via data embedding. Acoustics, Speech, and Signal Processing, Salt Lake City, USA, 2001, Vol.3:1449-1452.[12]Chung Kei Wong, Gouda M, Lam S S. Secure group communications using key graphs[J].IEEE/ACM Trans. on Networking.2000, 8(1):16-30[13]Wallner D, Harder E, Agee R. Key management for multicast: Issues and architectures. IETF RFC2627, June 1999.Moyer M, Rao J, Rohatgi P. Maintaining balanced key trees for secure multicast. Internet Draft,http.∥www.securemulticast.org/smug-drafts.htm, June 1999.[14]Xiaozhou Steve Li, Yang Richard Yang, Mohamed G. Gouda, Lam S S. Batch rekeying for secure group communications. 10th International Conference on World Wide Web, Hong Kong, May 2001: 525-534.
  • 加載中
計量
  • 文章訪問數:  2199
  • HTML全文瀏覽量:  101
  • PDF下載量:  642
  • 被引次數: 0
出版歷程
  • 收稿日期:  2003-04-09
  • 修回日期:  2003-09-12
  • 刊出日期:  2004-01-19

目錄

    /

    返回文章
    返回