KEY GRAPHS AND SECRET SHARING BE USED IN NETWORK MULTICAST SECURITY

被引:0
|
作者
Jin, Shangzhu [1 ]
Peng, Jun [1 ]
机构
[1] Chongqing Univ Sci & Technol, Sch Elect Informat Engn, Chongqing 401331, Peoples R China
来源
2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2 | 2009年
关键词
multicast securty; secret sharing; reconstruction of keys;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Multicast communication is increasingly used in applications where the volume of network traffic needs to be minimized. Security of the packets delivered from a source to a large group of receivers presents one of the most challenging research problems for the network architecture. A majority of the proposals for scalable secure multicasting makes use of hierarchical key distribution trees. The Centralized Tree-Based Key Management scheme assigns a unique key to each of the nodes in a member's path to the root. The group key is used by a central server to encrypt multicast data until a member joins or leaves the group.For multicast applications such as pay-per-view where the content has very high value, the group key may need to change frequently. In this paper, we introduce a new approach based on secret sharing in which the server assigns unique secret shares to the nodes in the distribution tree. Our proposal is a prepositioned shared secret scheme that allows the reconstruction of different keys by communicating different activating shares for the same prepositioned information.
引用
收藏
页码:592 / 596
页数:5
相关论文
共 50 条
  • [41] Optimal secret sharing for wireless information security in the era of Internet of Things
    Miao, Lei
    Jiang, Dingde
    PERSONAL AND UBIQUITOUS COMPUTING, 2019, 23 (5-6) : 723 - 738
  • [42] A new group key management protocol in WSNs based on secret sharing
    Yang, Xiao yuan
    Wang, Liqin
    Zhang, Qian
    2010 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2010,
  • [43] A General Approach to Authenticated Key Establishment Based on Homomorphic Secret Sharing
    Shenets, N. N.
    NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2024, 27 (03): : 301 - 310
  • [44] An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Liu, Yining
    Cheng, Chi
    Cao, Jianyu
    Jiang, Tao
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) : 2335 - 2336
  • [45] Group Key Management based on (2,2) Secret Sharing
    Wuu, Lih-Chyau
    Hung, Chi-Hsiang
    Kuo, Wen-Chung
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (03): : 1144 - 1156
  • [46] Protecting Data Privacy and Security for Cloud Computing Based on Secret Sharing
    Yang, Ching-Nung
    Lai, Jia-Bin
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 259 - 266
  • [47] Secure Key Transfer Protocol Based on Secret Sharing for Group Communications
    Lee, Chia-Yin
    Wang, Zhi-Hui
    Harn, Lein
    Chang, Chin-Chen
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2069 - 2076
  • [48] GAN-Based Key Secret-Sharing Scheme in Blockchain
    Zheng, Wenbo
    Wang, Kunfeng
    Wang, Fei-Yue
    IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (01) : 393 - 404
  • [49] Exact information ratios for secret sharing on small graphs with girth at least 5
    Harsanyi, Karoly
    Ligeti, Peter
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2019, 13 (02) : 107 - 116
  • [50] Secure image secret sharing over distributed cloud network
    Wu, Xiaotian
    Yang, Ching-Nung
    Li, Jian-Ming
    SIGNAL PROCESSING, 2021, 178