...
首页> 外文期刊>Information Sciences: An International Journal >Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
【24h】

Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks

机译:集成有线和无线网络中用于认证组密钥交换的资源感知协议

获取原文
获取原文并翻译 | 示例
           

摘要

Protocols for group key exchange are cryptographic algorithms that describe how a group of parties communicating over a public network can come up with a common secret key. Due to their critical role in building secure multicast channels, a number of group key exchange protocols have been proposed over the years in a variety of settings. However despite many impressive achievements, there seems to have been no previous systematic look at the growing problem of key exchange over integrated wired and wireless (IWW) networks which consist of two distinct types of users: users having low-performance mobile devices with some form of battery power and users having high-performance stationary computers with no power constraint. The contribution of the present work is to fill this deficiency by providing a secure and efficient protocol for resource-aware group key exchange over the rapidly expanding IWW networks. By evenly spreading much of the total amount of computation across high power users, our protocol avoids any potential performance bottleneck of the system while keeping the burden on low power users at minimal. Our protocol also achieves provable security against powerful active adversaries under the decisional Diffie-Hellman assumption. We provide a rigorous proof of security for the protocol in a well-defined formal model of communication and adversarial capabilities. (C) 2007 Elsevier Inc. All rights reserved.
机译:用于组密钥交换的协议是加密算法,描述了在公共网络上进行通信的一组参与者如何提出公共密钥。由于它们在建立安全的多播信道中的关键作用,多年来在各种环境中提出了许多组密钥交换协议。但是,尽管取得了令人瞩目的成就,但以前似乎并没有系统地研究由两种不同类型的用户组成的集成有线和无线(IWW)网络上不断增长的密钥交换问题:具有某种形式的低性能移动设备的用户电池电量的用户以及拥有不受功率限制的高性能固定式计算机的用户。本工作的贡献是通过为快速扩展的IWW网络上的资源感知组密钥交换提供安全有效的协议来弥补这一缺陷。通过将大量计算总量平均分配给高功率用户,我们的协议避免了系统的任何潜在性能瓶颈,同时使低功率用户的负担降至最低。在决策性Diffie-Hellman假设下,我们的协议还可以针对强大的主动对手实现可证明的安全性。我们在定义明确的通信和对抗能力的正式模型中,为协议提供了严格的安全性证明。 (C)2007 Elsevier Inc.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号