KEY GRAPHS AND SECRET SHARING BE USED IN NETWORK MULTICAST SECURITY

被引:0
|
作者
Jin, Shangzhu [1 ]
Peng, Jun [1 ]
机构
[1] Chongqing Univ Sci & Technol, Sch Elect Informat Engn, Chongqing 401331, Peoples R China
来源
2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2 | 2009年
关键词
multicast securty; secret sharing; reconstruction of keys;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multicast communication is increasingly used in applications where the volume of network traffic needs to be minimized. Security of the packets delivered from a source to a large group of receivers presents one of the most challenging research problems for the network architecture. A majority of the proposals for scalable secure multicasting makes use of hierarchical key distribution trees. The Centralized Tree-Based Key Management scheme assigns a unique key to each of the nodes in a member's path to the root. The group key is used by a central server to encrypt multicast data until a member joins or leaves the group.For multicast applications such as pay-per-view where the content has very high value, the group key may need to change frequently. In this paper, we introduce a new approach based on secret sharing in which the server assigns unique secret shares to the nodes in the distribution tree. Our proposal is a prepositioned shared secret scheme that allows the reconstruction of different keys by communicating different activating shares for the same prepositioned information.
引用
收藏
页码:592 / 596
页数:5
相关论文
共 50 条
  • [1] ON THE (IN)SECURITY OF GROUP KEY TRANSFER PROTOCOLS BASED ON SECRET SHARING
    Olimid, Ruxandra F.
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2013, 14 : 378 - 387
  • [2] Security Enhancement in Cloud Environment using Secure Secret Key Sharing
    Chhabra, Sakshi
    Singh, Ashutosh Kumar
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2020, 16 (04) : 296 - 307
  • [3] Key management for secure multicast communication using secret sharing-based revocation scheme
    Liu, XX
    Yang, M
    Wang, XK
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1262 - 1266
  • [4] Security and Improvement of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (05): : 1943 - 1949
  • [5] Secret sharing on large girth graphs
    Csirmaz, Laszlo
    Ligeti, Peter
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (03): : 399 - 410
  • [6] Secret sharing on large girth graphs
    László Csirmaz
    Péter Ligeti
    Cryptography and Communications, 2019, 11 : 399 - 410
  • [7] A Secret-sharing-based Key Management in Wireless Sensor Network
    Lan Yun
    Wu Chunying
    Zhang Yiying
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 676 - 679
  • [8] Security of Selected Secret Sharing Schemes
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Lidia
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 395 - 400
  • [9] Dependable security by twisted secret sharing
    Daskapan, S
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 193 - 207
  • [10] Secret Sharing Schemes for Dense Forbidden Graphs
    Beimel, Amos
    Farras, Oriol
    Peter, Naty
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 509 - 528