计算机应用 ›› 2018, Vol. 38 ›› Issue (5): 1372-1376.DOI: 10.11772/j.issn.1001-9081.2017102413
收稿日期:
2017-10-12
修回日期:
2017-12-04
出版日期:
2018-05-10
发布日期:
2018-05-24
通讯作者:
刘璟
作者简介:
敖丽(1993-),女,云南曲靖人,硕士研究生,主要研究方向:信息安全、密码学;刘璟(1972-),男,四川绵阳人,副教授,博士,主要研究方向:信息安全、计算机网络安全、密码学;姚绍文(1966-),男,湖南永顺人,教授,博士生导师,博士,主要研究方向:信息安全、分布式计算;武楠(1989-),女,河南南阳人,硕士研究生,主要研究方向:信息安全、密码学。
基金资助:
AO Li1, LIU Jing1, YAO Shaowen1, WU Nan2
Received:
2017-10-12
Revised:
2017-12-04
Online:
2018-05-10
Published:
2018-05-24
Contact:
刘璟
Supported by:
摘要: 逻辑密钥分层(LKH)协议已经被证明在抗完全合谋攻击时,它通信开销的下界是O(log n),但是在一些资源受限或者商业应用场景中,用户仍然要求通信开销低于O(log n)。虽然,有状态的完全排外子树(SECS)协议具有常量通信开销的特性,却只能抵抗单用户攻击。考虑用户愿意牺牲一定安全性来降低通信开销的情况,利用LKH协议的完全抗合谋攻击特性和SECS协议具有常量通信开销的优势,设计并实现了一种混合的组密钥更新协议(H-SECS)。H-SECS协议根据应用场景的安全级别来配置子组数目,在通信开销和抗合谋攻击能力之间作一个最优的权衡。理论分析及仿真实验表明,与LKH协议和SECS协议相比,H-SECS协议的通信开销可以在O(1)和O(log n)区间进行调控。
中图分类号:
敖丽, 刘璟, 姚绍文, 武楠. 抗合谋攻击能力可调的有状态组密钥更新协议[J]. 计算机应用, 2018, 38(5): 1372-1376.
AO Li, LIU Jing, YAO Shaowen, WU Nan. Stateful group rekeying scheme with tunable collusion resistance[J]. Journal of Computer Applications, 2018, 38(5): 1372-1376.
[1] WU Y, LIU J, HOU J, et al. A stateful multicast key distribution protocol based on identity-based encryption[C]//Proceedings of the 2017 IEEE/ACIS 16th International Conference on Computer and Information Science. Piscataway, NJ:IEEE, 2017:19-24. [2] SHERMAN A T, MCGREW D A. Key establishment in large dynamic groups using one-way function trees[J]. IEEE Transactions on Software Engineering, 2003, 29(5):444-458. [3] LIU J, YANG B. Collusion-resistant multicast key distribution based on homomorphic one-way function trees[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):980-991. [4] XU J, LI L, LU S, et al. A novel batch-based LKH tree balanced algorithm for group key management[J]. Science China Information Sciences, 2017, 60(10):108-301. [5] WONG C K, GOUDA M, LAM S S. Secure group communications using key graphs[J]. IEEE/ACM Transactions on Networking, 2000, 8(1):16-30. [6] WALLNER D, HARDER E, AGEE R. Key management for multicast:issues and architectures[EB/OL].[2017-06-20]. http://www.rfc-editor.org/in-notes/pdfrfc/rfc2627.txt.pdf. [7] MICCIANCIO D, PANJWANI S. Optimal communication complexity of generic multicast key distribution[J]. IEEE/ACM Transactions on Networking, 2004, 16(4):803-813. [8] DU W, HE M, X. Self-healing key distribution with revocation and resistance to the collusion attack in wireless sensor networks[C]//Proceedings of the 2nd International Conference on Provable Security. Berlin:Springer-Verlag, 2008:345-359. [9] PERRING A, STANKOVI J C, WAGNER D. Security in wireless sensor networks[J]. Communications of the ACM, 2004, 47(6):53-57. [10] 王洁,卢建朱,曾小飞. 可及时确定受攻击节点的无线传感器网络数据聚合方案[J]. 计算机应用,2016,36(9):2432-2437.(WANG J, LU J Z, ZENG X F. Data aggregation scheme for wireless sensor network to timely determine compromised nodes[J]. Journal of Computer Applications, 2016, 36(9):2432-2437.) [11] FAN J, JUDGE P, AMMAR H M. HySOR:group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers[C]//Proceedings of the 11th International Conference on Computer Communications and Networks. Washington, DC:IEEE Computer Society, 2002:196-201. [12] 姬东耀,王育民. 公平有效的Web视频服务即付即看协议设计与分析[J]. 西安电子科技大学学报(自然科学版),2001,8(4):425-429.(JI D Y, WANG Y M. Analysis and design of fair and efficient pay-per-view protocols for Web-based video service[J]. Journal of Xidian University (Natural Science Edition), 2001, 8(4):425-429.) [13] LIU J, HUANG Q, YANG B, et al. Efficient multicast key distribution using HOWP-based dynamic group access structures[J]. IEEE Transactions on Computers, 2013, 62(8):1656-1672. [14] LIU J, LIU M, WANG C J, et al. Group rekeying in the exclusive subset-cover framework[J]. Theoretical Computer Science, 2017, 678:63-77. [15] FIAT A, NAOR M. Broadcast encryption[C]//Proceedings of the 13th Annual International Conference on Advances in Cryptology. New York:Springer-Verlag, 1993:480-491. [16] KIM H, HONG M S, YOON H, et al. Secure group communication with multiplicative one-way functions[C]//Proceedings of the 2005 International Conference on Information Technology:Coding and Computing. Washington, DC:IEEE Computer Society, 2005:685-690. [17] CANETTI R, GARAY J, ITKIS G, et al. Multicast security:taxonomy and some efficient constructions[C]//Proceedings of the 1999 Conference on Computer Communications. Piscataway, NJ:IEEE, 1999:708-716. [18] KRAWCZYK H, BELLARE M, CANETTI R. HMAC:keyed-hashing for message authentication[EB/OL].[2017-06-20]. http://ikamr.asp24.no/kdrs/pdf-copies/org.python.library-000000825.pdf. [19] WANG X, YIN Y L, YU H. Finding collisions in the full SHA-1[C]//Proceedings of the 25th Annual International Conference on Advances in Cryptology. Berlin:Springer-Verlag, 2005:17-36. |
[1] | 毕文婷 林海涛 张立群. 基于多阶段演化信号博弈模型的移动目标防御决策算法[J]. 计算机应用, 0, (): 0-0. |
[2] | 朱玉娜, 张玉涛, 闫少阁, 范钰丹, 陈韩托. 基于半监督子空间聚类的协议识别方法[J]. 计算机应用, 2021, 41(10): 2900-2904. |
[3] | 肖跃雷, 邓小凡. 基于证书的有线局域网安全关联方案改进与分析[J]. 计算机应用, 2021, 41(7): 1970-1976. |
[4] | 杜心雨, 王化群. LTE-A网络中基于动态组的有效的身份认证和密钥协商方案[J]. 计算机应用, 2021, 41(6): 1715-1722. |
[5] | 王垚, 孙国梓. 基于聚类和实例硬度的入侵检测过采样方法[J]. 计算机应用, 2021, 41(6): 1709-1714. |
[6] | 葛丽娜, 胡雨谷, 张桂芬, 陈园园. 云计算环境基于客体属性匹配的逆向混合访问控制方案[J]. 计算机应用, 2021, 41(6): 1604-1610. |
[7] | 陈权 李莉 陈永乐 段跃兴. 面向深度学习可解释性的对抗攻击算法[J]. 计算机应用, 0, (): 0-0. |
[8] | 郭帅, 苏旸. 基于数据流的加密流量分类方法[J]. 计算机应用, 2021, 41(5): 1386-1391. |
[9] | 张全龙, 王怀彬. 基于膨胀卷积和门控循环单元组合的入侵检测模型[J]. 计算机应用, 2021, 41(5): 1372-1377. |
[10] | 唐延强, 李成海, 宋亚飞. 基于改进粒子群优化和极限学习机的网络安全态势预测[J]. 计算机应用, 2021, 41(3): 768-773. |
[11] | 杭梦鑫, 陈伟, 张仁杰. 基于改进的一维卷积神经网络的异常流量检测[J]. 计算机应用, 2021, 41(2): 433-440. |
[12] | 欧彬利, 钟夏汝, 代建华, 杨田. 基于变精度覆盖粗糙集的入侵检测方法[J]. 计算机应用, 2020, 40(12): 3465-3470. |
[13] | 杨建喜, 张媛利, 蒋华, 朱晓辰. 边缘计算中基于深度Q网络的物理层假冒攻击检测方法[J]. 计算机应用, 2020, 40(11): 3229-3235. |
[14] | 陈旖, 张美璟, 许发见. 基于一维卷积神经网络的HTTP慢速DoS攻击检测方法[J]. 计算机应用, 2020, 40(10): 2973-2979. |
[15] | 赵国新, 丁若凡, 游建舟, 吕世超, 彭锋, 李菲, 孙利民. 基于工控业务仿真的高交互可编程逻辑控制器蜜罐系统设计实现[J]. 计算机应用, 2020, 40(9): 2650-2656. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||