https://scholars.lib.ntu.edu.tw/handle/123456789/352525
標題: | Secure and Efficient Group Key Management with Shared Key Derivation | 作者: | J. C. Lin, K. H. Huang, H. C. Lee, FEI-PEI LAI |
關鍵字: | Group key management; Key tree; Secure group communication; Shared key derivation | 公開日期: | 一月-2009 | 卷: | 31 | 期: | 1 | 起(迄)頁: | 192-208 | 來源出版物: | The Journal of Computer Standards & Interfaces | 摘要: | In many network applications, including distant learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted in the multicast communication channel. In this paper, a new group key management protocol is proposed to reduce the communication and computation overhead of group key rekeying caused by membership changes. With shared key derivation, new keys derivable by members themselves do not have to be encrypted or delivered by the server, and the performance of synchronous and asynchronous rekeying operations, including single join, single leave, and batch update, is thus improved. The proposed protocol is shown to be secure and immune to collusion attacks, and it outperforms the other comparable protocols from our analysis and simulation. The protocol is particularly efficient with binary key trees and asynchronous rekeying, and it can be tuned to meet different rekeying delay or key size requirements. © 2007 Elsevier B.V. All rights reserved. |
URI: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-54349088694&doi=10.1016%2fj.csi.2007.11.005&partnerID=40&md5=30447a4595630c79b0bcc62878ec0941 | DOI: | 10.1016/j.csi.2007.11.005 | SDG/關鍵字: | Binary trees; Computer networks; Internet protocols; Multicasting; Network protocols; Sensor networks; Telecommunication; Videotex; Wireless telecommunication systems; Asynchronous; Batch updates; Collusion attacks; Computation overheads; Distant learnings; Efficient; Group key management; Group key management protocols; Group key managements; Group keys; Information transmitted; Key sizes; Key tree; Key trees; Multicast communications; Multicasts; Multiple users; Network applications; Online gamings; Rekeying; Secret keys; Secure group communication; Shared key derivation; To many; Webcasting; Public key cryptography |
顯示於: | 生醫電子與資訊學研究所 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。