RE-KEYING SCHEME FOR SECURE MULTICAST BASED ON MULTI-GROUP KEY TREE

被引:0
|
作者
Li, Yang [1 ]
Xu, Guoai [1 ]
Niu, Xinxin [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划); 中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A re-keying scheme with multi-group key tree shared between multicast groups under group members (GMs) overlapping condition was presented in this paper, and solved the problem that re-keying cost of multicast groups had a linear relationship with the number of multicast groups. In this scheme, leaf nodes on tree were private keys of GMs, extended root nodes were group keys and keys corresponding to all nodes were updated using Pseudo. Random Function (PRF) and Exclusive OR (XOR) operation. The simulation results of verification system show that this scheme obviously improves re-keying performance to some extent under communication scene with multicast groups.
引用
收藏
页码:68 / 71
页数:4
相关论文
共 50 条
  • [1] Kronos: A scalable group re-keying approach for secure multicast
    Setia, S
    Koussih, S
    Jajodia, S
    Harder, E
    [J]. 2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 215 - 228
  • [2] A secure re-keying scheme with key recovery property
    Kurnio, H
    Safavi-Naini, R
    Wang, HX
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 40 - 55
  • [3] Secure group re-keying using key inverses
    El-Zoghdy, Said Fathy
    Asem, Yasser Mohammed
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2011, 18 (01) : 47 - 68
  • [4] Efficient re-keying scheme for group key distribution
    Jiang, Yixin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    [J]. WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2639 - +
  • [5] Adaptive Secured Multicast Key Management with Re-Keying Process
    Rafiq, Jahir Ibna
    Abdullah-Al-Omar
    Chakraborty, Animesh
    Yusuf, Albub
    [J]. 2016 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC), 2016, : 181 - 185
  • [6] TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks
    Anand, Anshul
    Conti, Mauro
    Kaliyar, Pallavi
    Lal, Chhagan
    [J]. WIRELESS NETWORKS, 2020, 26 (04) : 2449 - 2463
  • [7] TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks
    Anshul Anand
    Mauro Conti
    Pallavi Kaliyar
    Chhagan Lal
    [J]. Wireless Networks, 2020, 26 : 2449 - 2463
  • [8] Optimized re-keying solution for secure multicast using PRF and XOR operation
    Li, Yang
    Xin, Yang
    Gao, Xue-Song
    Niu, Xin-Xin
    Yang, Yi-Xian
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2008, 31 (01): : 92 - 96
  • [9] Provably secure counter mode with related-key-based internal re-keying
    Evgeny K. Alekseev
    Kirill S. Goncharenko
    Grigory B. Marshalko
    [J]. Journal of Computer Virology and Hacking Techniques, 2020, 16 : 285 - 294
  • [10] Efficient re-keying protocols for multicast encryption
    Di Crescenzo, G
    Kornievskaia, O
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 119 - 132