首页> 外文学位 >Chinese Remainder Theorem based single and multi-group key management protocols.
【24h】

Chinese Remainder Theorem based single and multi-group key management protocols.

机译:基于中文剩余定理的单组和多组密钥管理协议。

获取原文
获取原文并翻译 | 示例

摘要

Modern communication network has made information sharing very easy. Information can be transmitted between two users through unicasts, or among a group of users through broadcasts or multicasts. Since most of the communication networks are transmitting information through public media, it brings the need for access control to transmitted data. Cryptographic techniques have been widely used to protect messages exchanged among users. Sharing a common secret, key only among the legitimate information users is the fundamental requirement of current available cryptographic techniques. There are many widely accepted algorithms which are designed to distribute a, shared key to two users. However, it is a challenge to efficiently distribute a common secret key to a group of users.; Researchers have proposed different designs for group key management (GKM). In general GKM protocols need to consider the trade-off between key server side and user side costs, which includes space, computation, and messaging requirements. The currently available representative set of GKM protocols require the key server to do O(log n) of key computation and transmission, and each user to have O(log n) of key space and do O(log n) of key processing, for a group with n users.; In this dissertation, we propose a set of GKM protocols, which are based on the Chinese Remainder Theorem. Each of our protocols is specifically designed for a different scenario. The Fast Chinese Remaindering Group Key Management Protocol is designed for small groups. The Hierarchical Chinese Remaindering Group Key Management Protocol is designed for medium to very large groups. The Chinese Remaindering Multi-Group Key Management Protocol is provided to manage multiple groups simultaneously. In general our protocols optimize the number of re-key message and user-side key computation and storage to O(1), and require the server to do O(n) computation for a small group and the server and subgroup controllers to do O(m) computation for a large group, where n is the group size and m is the average subgroup size. Additionally, the main computation of our protocols only involves XOR, modulo arithmetic, and multiplication. While, other protocols use encryption, decryption, and hashing, which are slower since those computations involve multiple rounds of the basic operations (XOR, multiplication, modulo, and so on). Security analysis has shown that our protocols satisfy all of the three security requirements of group communication: forward secrecy, backward secrecy, and counter collusion attack. Our protocols have also been demonstrated to be practically deployable by our simulated performance evaluation.
机译:现代通信网络使信息共享变得非常容易。信息可以通过单播在两个用户之间传输,也可以通过广播或多播在一组用户之间传输信息。由于大多数通信网络正在通过公共媒体传输信息,因此带来了对传输数据进行访问控制的需求。加密技术已被广泛用于保护用户之间交换的消息。仅在合法信息用户之间共享一个公共秘密,密钥是当前可用密码技术的基本要求。有许多被广泛接受的算法,旨在将共享密钥分发给两个用户。然而,有效地将公共密钥分发给一组用户是一个挑战。研究人员针对组密钥管理(GKM)提出了不同的设计。通常,GKM协议需要考虑关键服务器端和用户端成本之间的折衷,其中包括空间,计算和消息传递要求。 GKM协议的当前可用代表集要求密钥服务器执行密钥计算和传输的O(log n),并且每个用户都具有密钥空间的O(log n)和密钥处理的O(log n)。具有n个用户的组。本文提出了一套基于中国剩余定理的GKM协议。我们的每种协议都是专门为不同情况设计的。快速中文剩余组密钥管理协议是为小团体设计的。汉语分层其余组密钥管理协议是为中型到大型组设计的。提供了中文剩余多组密钥管理协议来同时管理多个组。通常,我们的协议将重新密钥消息的数量以及用户端密钥的计算和存储优化为O(1),并要求服务器为一小群服务器进行O(n)计算,而服务器和子组控制器则为O (m)计算一个大组,其中n是组大小,m是平均子组大小。此外,我们协议的主要计算仅涉及XOR,模算术和乘法。同时,其他协议使用加密,解密和散列,这较慢,因为这些计算涉及多轮基本操作(XOR,乘法,模等)。安全分析表明,我们的协议满足组通信的所有三个安全要求:正向保密,向后保密和反串通攻击。通过我们的模拟性能评估,我们的协议也被证明可以实际部署。

著录项

  • 作者

    Zheng, Xinliang.;

  • 作者单位

    University of South Carolina.;

  • 授予单位 University of South Carolina.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2007
  • 页码 117 p.
  • 总页数 117
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

  • 入库时间 2022-08-17 11:38:58

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号