欢迎来到天天文库
浏览记录
ID:36442602
大小:4.89 MB
页数:109页
时间:2019-05-10
《开放网络环境中安全群通信的密钥管理技术研究》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、上海交通大学博士学位论文开放网络环境中安全群通信的密钥管理技术研究姓名:李明申请学位级别:博士专业:计算机应用指导教师:白英彩20031101申请上海交通大学博士学位论文摘要较好的灵活性和通用性,也可以用于其它采用客户端-后台程序结构的群通信系统。最后以电子集市为例,描述了基于Spread的通用安全框架在群环境中的应用。关键词:密钥协商;动态对等群;基于身份的密码系统;Pairing;安全群通信平台;通用安全框架II申请上海交通大学博士学位论文摘要ABSTRACTWiththerapiddevelopmentofthenetwork,alotofapplications
2、basedonthegroupcommunicationappear.Theresearchonsecurityserviceforreliablegroupcommunicationsystemsisnowaninterestingarea,andofwhichkeymanagementschemeisthemostdifficultpart.Thisthesisfocusesonthekeymanagementschemesofdynamicpeergroups.Afterstudyingofexistingschemes,wecometotheconclusion
3、thatkeyagreementschemesbasedontreecanfitdynamicpeergroupsbest.However,theexistingschemespresentdrawbacksinperformanceorsecurityattributes.Becausebetterperformanceandsecurityarecontradictions,itisverydifficulttoimprovethesetwothingsatthesametime.Thereforethekeyagreementschemesproposedinth
4、isthesisareinthreekinds.First,ourgoalistodecreasethecost,andthetripletreeisintroducedintothegroupkeyagreement.Second,ageneralmethodisintroducedtoprovideimplicitkeyauthenticationforbinarytreebasedschemes.Thentwoauthenticatedkeyagreementschemesareproposed.Finally,wecombinetheaboveworkandpr
5、oposetwoauthenticatedtripletreebasedgroupkeyagreementschemes.Thecontributionsofthisthesisareasfollows:1.ThetripletreeandPairingarecombinedtobuildanefficientgroupkeyagreementschemePTDH.Thecommunicationalcostcausedbytheincreaseofthegroupmemberscanbeignored.ItscomputationalcostisO(log3n).Be
6、causethecostoftree-basedschemesdependsontheheightofthetrees,using3-arytreecandecreasethecost.Astheresult,PTDHismoreefficientthanbinarytree-basedschemes.Inaddition,Pairingcanbringhighersecurityandflexibility,whichmakesPTDHsuitablefordifferentapplications.2.Anauthenticatedtwo-partykeyagree
7、mentprotocolPAGKAbasedonPairingisproposedandthenextendedtomulti-party.PAGKAinvolvesmembers’long-termkeysandsessionrandomsinthegroupkeytoprovideresistancetoknown-keyattacksandman-in-the-middleattacks.TheideabehindPAGKAcanbeusedasageneralapproachtoextendauthenticatedtwo-par
此文档下载收益归作者所有