首页> 外文会议>IEEE Military Communications Conference >Secure Proxy-Reencryption-based Inter-network Key Exchange
【24h】

Secure Proxy-Reencryption-based Inter-network Key Exchange

机译:基于安全的代理重新加密的Internet网络密钥交换

获取原文

摘要

In this paper we present a novel approach to distribute session keys securely across administrative boundaries where participants may be unable to interact directly. The basis of our approach is the use of Proxy ReEncryption (PRE) to encrypt session keys (e.g., AES keys), publish the session keys to a proxy server, and then distribute the session keys to session participants who reencrypt, decrypt and access the session keys. Our approach, Secure Proxy-Reencryption-based Inter-network Key Exchange (SPIKE), applies to several real-world use cases, including coalition data sharing, sensor network data sharing and large-scale video distribution. SPIKE enables these use cases without requiring coordination between publishers and subscribers. We address an honest-but-curious adversary model where any data sent over a network link or stored at a proxy can be leaked. Our design of SPIKE is independent of the specific PRE scheme used. For implementation and experimentation purposes we implement and use, PALISADE, a general post-quantum lattice-based encryption library that provides a unidirectional PRE scheme with collusion resistance, supports multi-hop reencryption, and admits more general homomorphic encryption properties than other schemes. We present our design and implementation in experimental settings to evaluate real-world performance. We discuss generalization of our approach to increase scalability and address broader security concerns.
机译:在本文中,我们介绍了一种新的方法来跨越参与者无法直接互动的行政界限将会话密钥分发。我们的方法的基础是使用代理再生(Pre)加密会话键(例如,AES键),将会话键发布到代理服务器,然后将会话键分发给reencrypt,解密和访问的会话参与者会话键。我们的方法,安全的代理 - 重新创建网络网络间关键交换(Spike),适用于多个真实用例,包括联盟数据共享,传感器网络数据共享和大规模视频分布。斯派克使这些用例能够在出版商和订阅者之间需要协调。我们解决了一个诚实但奇怪的对手模型,其中通过网络链路发送或存储在代理上的任何数据都可以泄露。我们的尖峰设计独立于所使用的特定前方案。对于实施和实验目的,我们实施和使用,普拉索德,一般的基于金额晶格的加密库,提供了具有抗抗抗抗抗抵抗力的单向前的方案,支持多跳再恢复,并承认比其他方案更一般的同均匀加密性。我们在实验环境中展示了我们的设计和实施,以评估现实世界的性能。我们讨论我们的方法的概括,以提高可扩展性和解决更广泛的安全问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号