Research on Key Management for Multi-Privileged Group Communications

被引:5
|
作者
Zhou, Wei [1 ,2 ]
Xu, Yang [1 ]
Wang, Guojun [1 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Hunan Agr Univ, Coll Informat Sci & Technol, Changsha 410128, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
key management; rekeying; mult-privileged group communications; security; ACCESS-CONTROL; SCHEME;
D O I
10.1109/Trustcom.2015.369
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In some group-oriented applications, users can access several data resources according to their respective willingness. So, how to effectively access the data resources is a challenge in multi-privileged group communications. Some key management schemes for hierarchical access control are proposed. In this paper, we discuss the challenges of key management. Then, we present a list of evaluation criteria for secure key management for multi-privileged group communications, and investigate the features of some typical schemes. The schemes can be divided into several classes according to some separate dimensions, such as the topology of key model, the rekeying method, the rekeying policy and the encryption method of data resources. We analyze them comparatively regarding to the secure distribution and renewal of key materials.
引用
收藏
页码:151 / 158
页数:8
相关论文
共 50 条
  • [21] Satellite Multi-Group Key Management
    Sun, Yanming
    Ma, Hengtai
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 894 - 899
  • [22] The Research of Security Network Group Key Management
    Hu, Ge
    Wang, Wei
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1497 - 1502
  • [23] A scalable key-management scheme with minimizing key storage for secure group communications
    Tseng, Yuh-Min
    International Journal of Network Management, 2003, 13 (06) : 419 - 425
  • [24] Research and implementation of group key management in batch group rekeying
    College of Mathematics and Computer Science, Anhui Normal University, Wuhu 241000, China
    Dongnan Daxue Xuebao, 2006, 3 (488-492):
  • [25] MK-AMI: efficient Multi-group Key management scheme for secure communications in AMI systems
    Benmalek, Mourad
    Challal, Yacine
    2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,
  • [26] Elliptic curve cryptosystem-based group key management for secure group communications
    Sakarindr, Pitipatana
    Ansari, Nirwan
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 3443 - 3448
  • [27] PRIVILEGED COMMUNICATIONS - INROADS ON CONTROL GROUP TEST IN CORPORATE AREA
    MADDEN, LJ
    SYRACUSE LAW REVIEW, 1971, 22 (03) : 759 - 769
  • [28] A Decentralized Multi-Group Key Management Scheme
    Hur, Junbeom
    Yoon, Hyunsoo
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (02) : 632 - 635
  • [29] Multi-layer key management for secure multimedia multicast communications
    Sun, Y
    Liu, KJR
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 205 - 208
  • [30] A key management for wireless communications
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Chong, Song-Kong
    Lo, Jung-Wen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (08): : 2045 - 2056