KEY GRAPHS AND SECRET SHARING BE USED IN NETWORK MULTICAST SECURITY

被引:0
|
作者
Jin, Shangzhu [1 ]
Peng, Jun [1 ]
机构
[1] Chongqing Univ Sci & Technol, Sch Elect Informat Engn, Chongqing 401331, Peoples R China
来源
2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2 | 2009年
关键词
multicast securty; secret sharing; reconstruction of keys;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multicast communication is increasingly used in applications where the volume of network traffic needs to be minimized. Security of the packets delivered from a source to a large group of receivers presents one of the most challenging research problems for the network architecture. A majority of the proposals for scalable secure multicasting makes use of hierarchical key distribution trees. The Centralized Tree-Based Key Management scheme assigns a unique key to each of the nodes in a member's path to the root. The group key is used by a central server to encrypt multicast data until a member joins or leaves the group.For multicast applications such as pay-per-view where the content has very high value, the group key may need to change frequently. In this paper, we introduce a new approach based on secret sharing in which the server assigns unique secret shares to the nodes in the distribution tree. Our proposal is a prepositioned shared secret scheme that allows the reconstruction of different keys by communicating different activating shares for the same prepositioned information.
引用
收藏
页码:592 / 596
页数:5
相关论文
共 50 条
  • [31] Secret sharing a key in a distributed way, Lagrange vs Newton
    Voudouris, Anastassios
    Politis, Ilias
    Xenakis, Christos
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [32] Data security in MANETs by integrating multipath routing and secret sharing
    Wu, Minghu
    Chen, Siguang
    Liao, Jiaping
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 1, 2010, : 72 - 75
  • [33] Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Jeon, Woongryul
    Lee, Byunghee
    Won, Dongho
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 309 - +
  • [34] OPTIMAL INFORMATION RATIO OF SECRET SHARING SCHEMES ON DUTCH WINDMILL GRAPHS
    Bagherpour, Bagher
    Janbaz, Shahrooz
    Zaghian, Ali
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2019, 13 (01) : 89 - 99
  • [35] An Approach of Secret Sharing Technique Based on Convolution Neural Network and DNA Sequence for Data Security in Wireless Communication
    Bhowmik, Anirban
    Karforma, Sunil
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (04) : 3413 - 3444
  • [36] An Approach of Secret Sharing Technique Based on Convolution Neural Network and DNA Sequence for Data Security in Wireless Communication
    Anirban Bhowmik
    Sunil Karforma
    Wireless Personal Communications, 2022, 124 : 3413 - 3444
  • [37] Behavior Steganography in Social Network via Secret Sharing
    Zhu, Xuan
    Mo, Qun
    Li, Fengyong
    Zhang, Lei
    Qin, Chuan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 299 - 308
  • [38] Medical Image Security with Cheater Identification Using Secret Sharing Scheme
    Krishnan, Arun
    Das, Manik Lal
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 117 - 126
  • [39] Optimal secret sharing for wireless information security in the era of Internet of Things
    Lei Miao
    Dingde Jiang
    Personal and Ubiquitous Computing, 2019, 23 : 723 - 738
  • [40] Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing
    Gundapuneni, Manas Abhilash
    Bano, Anzum
    Singh, Navjot
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 749 - 755