[1]许勇.批量密钥更新中密钥组织方法的研究与实现[J].东南大学学报(自然科学版),2006,36(3):488-492.[doi:10.3969/j.issn.1001-0505.2006.03.032]
 Xu Yong.Research and implementation of group key management in batch group rekeying[J].Journal of Southeast University (Natural Science Edition),2006,36(3):488-492.[doi:10.3969/j.issn.1001-0505.2006.03.032]
点击复制

批量密钥更新中密钥组织方法的研究与实现()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
36
期数:
2006年第3期
页码:
488-492
栏目:
计算机科学与工程
出版日期:
2006-05-20

文章信息/Info

Title:
Research and implementation of group key management in batch group rekeying
作者:
许勇
安徽师范大学数学计算机学院, 芜湖 241000
Author(s):
Xu Yong
College of Mathematics and Computer Science, Anhui Normal University, Wuhu 241000, China
关键词:
安全多播 层次密钥树 密钥更新 多级密钥树
Keywords:
secure multicast logical key hierarchy rekeying multi-level-key tree
分类号:
TP393.3
DOI:
10.3969/j.issn.1001-0505.2006.03.032
摘要:
在对批量密钥更新和成员行为进行分析的基础上,对现有的优化密钥树结构进行了优化,并给出了一种实现方法.该方法基于Huffman树的构造方法,将组成员的变化概率与成员所在的密钥树级别进行关联,形成多级密钥树,最低级别密钥树高度为1.成员变化概率越大,所在的密钥树级别越低.当成员变化概率发生动态改变时,成员的位置也可随之更改.这种方法较好地解决了多播组中异构成员变化带来的组密钥更新问题.仿真实验结果表明,提出的优化树结构更具有一般意义,可适应具有较大动态变化情形的安全多播密钥更新.
Abstract:
Based on batch group rekeying and group members’ behavior, a new method which optimizes the current key tree structure is proposed. The method is based on the extending of traditional Huffman tree. It expands the group member’s model of uniform probability to a diverse one, and establishes the relationship of member change probability with one of the multi-lever-key trees. The height of the lowest tree is 1. The bigger the probability of a member, the lower the tree height in it. When members’ probabilities change, their locations can be changed afterwards. The method can solve the problem of group rekeying with heterogeneous group members. Simulation results show that the method is more generalizing than others and is more adaptive to secure multicast group with various group behaviors.

参考文献/References:

[1] Hardjono T,Weis B.RFC 3740 The multicast group security architecture[S].USA:IETF,2004.
[2] Baugher M,Canetti R,Dondeti L,et al.RFC 4046 Multicast security group key management architecture[S].USA:IETF,2005.
[3] Moyer J,Rao J R,Rohatgi P.A survey of security issues in multicast communications[J].IEEE Network,1999,13(6):12-23.
[4] Wong C K,Gouda M,Lam S S.Secure group communications using key graphs[J].IEEE/ACM Transactions on Networking,2000,8(1):16-30.
[5] Steve L X,Richard Y Y,Gouda M G,et al.Batch rekeying for secure group communications[C] // Proceedings of the 10th International World Wide Web Conference.Hong Kong,China,2001:525-534.
[6] Setia S,Koussih S,Jajodia S,et al.Kronos:a scalable group re-keying approach for secure multicast[C] //Proceedings of IEEE Symposium on Security and Privacy.Berkeley,CA,2000:215-228.
[7] Zhu F,Chan A,Noubir G.Optimal tree structure for key management of simultaneous join/leave in secure multicast[C] //Military Communications Conference.Boston,2003:773-778.
[8] Zhu S,Setia S,Jajodia S.Performance optimizations for group key management schemes for secure multicast[C] //Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems.Rhode Island,USA,2003:163-173.
[9] Almeroth K,Ammar M.Multicast group behavior in the Internet’s multicast backbone(MBone)[J].IEEE Communications Magazine,1997,35(6):224-229.
[10] Almeroth K C.A long-term analysis of growth and usage patterns in the multicast backbone(MBone)[C] //Proceedings of Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies.Tel Aviv,Israel,2000:824-833.

备注/Memo

备注/Memo:
基金项目: 安徽省教育厅自然科学基金重点资助项目(2005KJ009ZD).
作者简介: 许勇(1966—),男,博士,教授,yxull@mail.ahnu.edu.cn.
更新日期/Last Update: 2006-05-20