RE-KEYING SCHEME FOR SECURE MULTICAST BASED ON MULTI-GROUP KEY TREE

被引:0
|
作者
Li, Yang [1 ]
Xu, Guoai [1 ]
Niu, Xinxin [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A re-keying scheme with multi-group key tree shared between multicast groups under group members (GMs) overlapping condition was presented in this paper, and solved the problem that re-keying cost of multicast groups had a linear relationship with the number of multicast groups. In this scheme, leaf nodes on tree were private keys of GMs, extended root nodes were group keys and keys corresponding to all nodes were updated using Pseudo. Random Function (PRF) and Exclusive OR (XOR) operation. The simulation results of verification system show that this scheme obviously improves re-keying performance to some extent under communication scene with multicast groups.
引用
收藏
页码:68 / 71
页数:4
相关论文
共 50 条
  • [1] Re-keying solution for secure multicast using shared key tree among multicast sessions in same group
    National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Wuhan Ligong Daxue Xuebao/Journal of Wuhan University of Technology, 2008, 30 (12): : 98 - 102
  • [2] Kronos: A scalable group re-keying approach for secure multicast
    Setia, S
    Koussih, S
    Jajodia, S
    Harder, E
    2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 215 - 228
  • [3] A secure re-keying scheme with key recovery property
    Kurnio, H
    Safavi-Naini, R
    Wang, HX
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 40 - 55
  • [4] Secure group re-keying using key inverses
    El-Zoghdy, Said Fathy
    Asem, Yasser Mohammed
    JOURNAL OF HIGH SPEED NETWORKS, 2011, 18 (01) : 47 - 68
  • [5] A computationally efficient key-hiding based group re-keying scheme for secure multicasting
    Asem, Y.M.
    Kara, A.
    International Journal of Computers and Applications, 2006, 28 (01) : 65 - 72
  • [6] Efficient re-keying scheme for group key distribution
    Jiang, Yixin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2639 - +
  • [7] Adaptive Secured Multicast Key Management with Re-Keying Process
    Rafiq, Jahir Ibna
    Abdullah-Al-Omar
    Chakraborty, Animesh
    Yusuf, Albub
    2016 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC), 2016, : 181 - 185
  • [8] TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks
    Anshul Anand
    Mauro Conti
    Pallavi Kaliyar
    Chhagan Lal
    Wireless Networks, 2020, 26 : 2449 - 2463
  • [9] TARE: Topology Adaptive Re-kEying scheme for secure group communication in IoT networks
    Anand, Anshul
    Conti, Mauro
    Kaliyar, Pallavi
    Lal, Chhagan
    WIRELESS NETWORKS, 2020, 26 (04) : 2449 - 2463
  • [10] Optimized re-keying solution for secure multicast using PRF and XOR operation
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2008, 1 (92-96): : 92 - 96