首页 | 本学科首页   官方微博 | 高级检索  
     

结构化公开加密密钥支撑群组密钥操作研究
引用本文:周健,孙丽艳,陈红琳. 结构化公开加密密钥支撑群组密钥操作研究[J]. 计算机工程与科学, 2018, 40(10): 1780-1786
作者姓名:周健  孙丽艳  陈红琳
作者单位:(1.安徽财经大学管理科学与工程学院,安徽 蚌埠 233041;2.北京邮电大学计算机学院,北京 100083)
基金项目:国家自然科学基金(61402001,61402147);安徽省高等学校自然基金(KJ2013B001);安徽财经大学重点项目(ACKY1517ZDB)
摘    要:加密解密协议中的单加密解密密钥结构不能满足群组密钥管理的性能需要,公开加密密钥更新导致全部解密密钥更新。针对这一问题,提出结构化公开加密密钥组织结构,满足密钥独立性的群组解密密钥集合成员具有有限修改公开加密密钥的能力,使得群组成员在无可信中心支持下采用自配置方式更新公开加密密钥,更新后的公开加密密钥不会破坏非更新成员解密密钥的合法性。给出的公钥结构丰富了解密密钥和加密密钥之间的关系,扩展了群组密钥操作,适合环境苛刻的网络群组密钥管理。

关 键 词:群组密钥  结构化公钥  密钥操作  密钥独立性  自配置  
收稿时间:2017-04-05
修稿时间:2018-10-25

Group key operations based on structured public key
ZHOU Jian,SUN Li yan,CHEN Hong lin. Group key operations based on structured public key[J]. Computer Engineering & Science, 2018, 40(10): 1780-1786
Authors:ZHOU Jian  SUN Li yan  CHEN Hong lin
Affiliation:(1.School of Management Science and Engineering,Anhui University of Finance and Economics,Anhui 233041;2.School of Computer,Beijing University of Posts and Telecommunications,Beijing 100083,China) 
Abstract:The structure of public encryption key cannot meet the performance requisition for group key management based on one decryption key one encryption key algorithm. All group members need to participate in rekeying if the public encryption key is updated. To solve the problem, a structured public encryption key is proposed. Decryption keys are composed into a key set, any decryption key with key independence from the set has limited capability to modify the public encryption key, so the rekeying implements successfully by self configuration mode without support of powerful trusted entity, and the new public encryption key does not break the validity of other decryption key members. In this perspective, the proposed public encryption key structure enriches the relationship between decryption key and encryption key, and extends the key operations for dynamic groups. Besides, it is particularly adaptable to group key management of networks in harsh environment.
Keywords:group key  structured public key  key operations  key independence  self configuration  
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号