Distributed Key Revocation Scheme Based on Shared Binary Tree

被引:0
作者
Wang, Shaoren [1 ]
Du, Xuehui [1 ]
Yang, Zhi [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou, Henan, Peoples R China
来源
PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC) | 2015年
关键词
ID-based; binary tree; key revocation; distributed;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Concerning the identity-based binary tree key revocation scheme, the storage and use of binary tree can not be guaranteed in open cloud environment. This paper proposes a distributed key revocation scheme based on shared binary tree. The scheme splits the binary key tree into branches and distributes them to multiple nodes to save. Then multiple nodes work together to rebuild the key. At the same time, this paper optimizes the lookup algorithm during rebuilding. It solves the issues on distributed storage, safe use and fast reconstruction of the binary tree in the open environment. Experiments and analysis show that the scheme has higher efficiency and makes identity-based key revocation scheme run safely in the open environment.
引用
收藏
页码:338 / 342
页数:5
相关论文
共 16 条
[1]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[2]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[3]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[4]  
Brown A, 2006, TOOLS PEER TO PEER N
[5]  
Foster I., 2008, GRID COMPUTING ENV W, P1, DOI DOI 10.1109/GCE.2008.4738445
[6]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[7]  
Gummadi Krishna P., 2002, P SIGCOMMIMW 2002 MA
[8]   An improved pairing-free identity-based authenticated key agreement protocol based on ECC [J].
Islam, S. K. Hafizul ;
Biswas, G. P. .
INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND SYSTEM DESIGN 2011, 2012, 30 :499-507
[9]  
Jae Hong Seo, 2013, Topics in Cryptology - CT-RSA 2013. The Cryptographers Track at the RSA Conference 2013. Proceedings, P343, DOI 10.1007/978-3-642-36095-4_22
[10]  
Libert B, 2009, LECT NOTES COMPUT SC, V5473, P1, DOI 10.1007/978-3-642-00862-7_1