[1]刘淑影,许勇,杨帆. 基于成员行为的超球形批量密钥更新方法[J].计算机技术与发展,2015,25(03):131-135.
 LIU Shu-ying,XU Yong,YANG Fan. Hypterball Batch Key Updating Method Based on Members’ Behavior[J].,2015,25(03):131-135.
点击复制

 基于成员行为的超球形批量密钥更新方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年03期
页码:
131-135
栏目:
安全与防范
出版日期:
2015-03-10

文章信息/Info

Title:
 Hypterball Batch Key Updating Method Based on Members’ Behavior
文章编号:
1673-629X(2015)03-0131-05
作者:
 刘淑影许勇杨帆
 安徽师范大学 数学计算机学院 计算机系
Author(s):
 LIU Shu-yingXU YongYANG Fan
关键词:
 多播安全批量更新成员行为超球形概率
Keywords:
 multicast securitybatching rekeymembers’ behaviorhypterballprobability
分类号:
TP301
文献标志码:
A
摘要:
 安全多播的核心问题是组密钥的安全管理。在超球形多播密钥更新方法的基础上,结合安全多播中的批量更新和成员行为,提出了一种基于成员行为的超球形批量密钥更新方法。该方案突破了传统的LKH方法,既充分利用成员之间的独立性和协同性,又兼顾到多播成员行为,从而有效降低组密钥更新的通信开销。根据成员的行为概率来构造超球形密钥树,尽可能地让更新报文包含多成员所需要的信息。仿真实验表明:在保证前向和后向安全性的同时,当成员加入或离开,特别是当成员的变化概率相差比较大时,该方案不但可以有效地降低组密钥的更新开销,而且可以极大地提高密钥的更新效率。
Abstract:
 he core issue of secure multicast is the safe management of the group key. Based on analysis of the multicast rekeying method of hypterball,combined the batch key updating and member’ s behavior,the hypterball multicast key updating method based on members’ behavior is proposed in this paper. The scheme breaks through the traditional method of LKH,and it not only makes full use of independ-ence and cooperation between members,but also considers the members’ behavior,and then improves the communication efficiency. Ac-cording to the probability of the behavior of members,construct the hypterball key tree,as far as possible let updated message contain the information the members need. Simulation experiment shows that when members join in or leave the group,especially when the probabili-ty of the members’ change is largely different,this scheme will greatly reduce the cost of key updating and improve the efficiency of the key updating,at the same time the forward and backward security are ensured.

相似文献/References:

[1]张伟 许勇 赵克淳.基于PIM—DM批量密钥更新仿真研究[J].计算机技术与发展,2007,(09):160.
 ZHANG Wei,XU Yong,ZHAO Ke-chun.Simulation Research Based on PIM- DM Batch Rekeying[J].,2007,(03):160.
[2]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(03):1.
[3]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(03):5.
[4]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(03):13.
[5]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(03):21.
[6]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(03):25.
[7]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(03):29.
[8]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(03):34.
[9]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(03):38.
[10]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(03):43.

更新日期/Last Update: 2015-05-04