[1] WU Y, LIU J, HOU J, et al. A stateful multicast key distribution protocol based on identity-based encryption[C]//Proceedings of the 2017 IEEE/ACIS 16th International Conference on Computer and Information Science. Piscataway, NJ:IEEE, 2017:19-24. [2] SHERMAN A T, MCGREW D A. Key establishment in large dynamic groups using one-way function trees[J]. IEEE Transactions on Software Engineering, 2003, 29(5):444-458. [3] LIU J, YANG B. Collusion-resistant multicast key distribution based on homomorphic one-way function trees[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):980-991. [4] XU J, LI L, LU S, et al. A novel batch-based LKH tree balanced algorithm for group key management[J]. Science China Information Sciences, 2017, 60(10):108-301. [5] WONG C K, GOUDA M, LAM S S. Secure group communications using key graphs[J]. IEEE/ACM Transactions on Networking, 2000, 8(1):16-30. [6] WALLNER D, HARDER E, AGEE R. Key management for multicast:issues and architectures[EB/OL].[2017-06-20]. http://www.rfc-editor.org/in-notes/pdfrfc/rfc2627.txt.pdf. [7] MICCIANCIO D, PANJWANI S. Optimal communication complexity of generic multicast key distribution[J]. IEEE/ACM Transactions on Networking, 2004, 16(4):803-813. [8] DU W, HE M, X. Self-healing key distribution with revocation and resistance to the collusion attack in wireless sensor networks[C]//Proceedings of the 2nd International Conference on Provable Security. Berlin:Springer-Verlag, 2008:345-359. [9] PERRING A, STANKOVI J C, WAGNER D. Security in wireless sensor networks[J]. Communications of the ACM, 2004, 47(6):53-57. [10] 王洁,卢建朱,曾小飞. 可及时确定受攻击节点的无线传感器网络数据聚合方案[J]. 计算机应用,2016,36(9):2432-2437.(WANG J, LU J Z, ZENG X F. Data aggregation scheme for wireless sensor network to timely determine compromised nodes[J]. Journal of Computer Applications, 2016, 36(9):2432-2437.) [11] FAN J, JUDGE P, AMMAR H M. HySOR:group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers[C]//Proceedings of the 11th International Conference on Computer Communications and Networks. Washington, DC:IEEE Computer Society, 2002:196-201. [12] 姬东耀,王育民. 公平有效的Web视频服务即付即看协议设计与分析[J]. 西安电子科技大学学报(自然科学版),2001,8(4):425-429.(JI D Y, WANG Y M. Analysis and design of fair and efficient pay-per-view protocols for Web-based video service[J]. Journal of Xidian University (Natural Science Edition), 2001, 8(4):425-429.) [13] LIU J, HUANG Q, YANG B, et al. Efficient multicast key distribution using HOWP-based dynamic group access structures[J]. IEEE Transactions on Computers, 2013, 62(8):1656-1672. [14] LIU J, LIU M, WANG C J, et al. Group rekeying in the exclusive subset-cover framework[J]. Theoretical Computer Science, 2017, 678:63-77. [15] FIAT A, NAOR M. Broadcast encryption[C]//Proceedings of the 13th Annual International Conference on Advances in Cryptology. New York:Springer-Verlag, 1993:480-491. [16] KIM H, HONG M S, YOON H, et al. Secure group communication with multiplicative one-way functions[C]//Proceedings of the 2005 International Conference on Information Technology:Coding and Computing. Washington, DC:IEEE Computer Society, 2005:685-690. [17] CANETTI R, GARAY J, ITKIS G, et al. Multicast security:taxonomy and some efficient constructions[C]//Proceedings of the 1999 Conference on Computer Communications. Piscataway, NJ:IEEE, 1999:708-716. [18] KRAWCZYK H, BELLARE M, CANETTI R. HMAC:keyed-hashing for message authentication[EB/OL].[2017-06-20]. http://ikamr.asp24.no/kdrs/pdf-copies/org.python.library-000000825.pdf. [19] WANG X, YIN Y L, YU H. Finding collisions in the full SHA-1[C]//Proceedings of the 25th Annual International Conference on Advances in Cryptology. Berlin:Springer-Verlag, 2005:17-36. |