Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊網路與多媒體研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29853
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor雷欽隆
dc.contributor.authorChao-Chun Kangen
dc.contributor.author康照群zh_TW
dc.date.accessioned2021-06-13T01:21:45Z-
dc.date.available2008-01-19
dc.date.copyright2007-07-20
dc.date.issued2007
dc.date.submitted2007-07-16
dc.identifier.citation[1] A. Sherman and D. McGrew, “Key Establishment in Large Dynamic Groups using One-Way Function Trees,” IEEE Transactions on Software Engineering, Volume 29, No. 5, pp. 444—458, May 2003.
[2] C.-S. Park and D.-H. Lee, “Secure and Efficient Key Management for Dynamic Multicast Groups,” ACM SIGOPS Operating Systems Review, Volume 35, Issue 4, pp. 32—38, October 2001.
[3] C. Wong, M. Gouda, and S. Lam, “Secure Group Communications using Key Graphs,” ACM SIGCOMM '98, pp. 68—79, September 1998.
[4] D.-W. Kwak, S.-J. Lee, and J.-W. Kim, “An Efficient LKH Tree Balancing Algorithm for Group Key Management,” Communications Letters, IEEE, Volume 10, Issue 3, pp. 222—224, March 2006.
[5] D. Wallner, E. Harder, and R. Agee, “Key Management for Multicast: Issues and Architectures,” RFC 2627, June 1999.
[6] F.-Y. Lee and S. Shieh, “Scalable and Lightweight Key Distribution for Secure Group Communications,” International Journal of Network Management, Volume 14, Issue 3, pp. 167—176, May 2004.
[7] G.-H. Chiou and W.-T. Chen, “Secure Broadcast using Secure Lock,” IEEE Transactions on Software Engineering, pp. 929—934, August 1989.
[8] H. Harney and C. Muckenhirn, “Group Key Management Protocol (GKMP) Architecture,” RFC 2094, July 1997.
[9] J.-C. Lin, F.-P. Lai, and H.-C. Lee, “Efficient Group Key Management Protocol with One-Way Key Derivation,” The IEEE Conference on Local Computer Networks, 2005, pp. 336—343, November 2005.
[10] M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman Key Distribution Extended to Group Communication,” Proceedings of the 3rd ACM conference on Computer and communications security CCS '96, pp. 31—37, January 1996.
[11] M. Steiner, G. Tsudik, and M. Waidner, “CLIQUES: A New Approach to Group Key Agreement,” Distributed Computing Systems, pp. 380—387, May 1998.
[12] O. Pereira and J.-J. Quisquater, “Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols,” Computer Security Foundations Workshop, pp. 16—29, June 2004.
[13] P. Adusumilli, Z. Xukai, and B. Ramamurthy, “DGKD: Distributed Group Key Distribution with Authentication Capability,” Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005, pp. 286—293, June 2005.
[14] S. Mittra, “Iolus: A Framework for Scalable Secure Multicasting,” ACM SIGCOMM '97, pp. 277—288, September 1997.
[15] S. Rafaeli and D. Hutchison, “A Survey of Key Management for Secure Group Communication,” ACM Computing Surveys, Volume 35, No. 3, pp. 309—329, September 2003.
[16] W.-T. Zhu, “Optimizing the Tree Structure in Secure Multicast Key Management,” Communications Letters, IEEE, Volume 9, Issue 5, pp. 477—479, May 2005.
[17] Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik, “On the Performance of Group Key Agreement Protocols,” ACM Transactions on Information and System Security (TISSEC), Volume 7, Issue 3, pp. 457—488, August 2004.
[18] Y. Challal, H. Bettahar, and A. Bouabdallah, “SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications,” ACM SIGCOMM Computer Communications Review, Volume 34, No. 2, pp. 55—70, April 2004.
[19] Y. Challal and H. Seba, “Group Key Management Protocols: A Novel Taxonomy,” International Journal of Information Technology, Volume 2, No. 1, pp. 105—108, May 2005.
[20] Y. Kim, A. Perrig, and G. Tsudik,“ Tree-Based Group Key Agreement,” ACM Transactions on Information and System Security (TISSEC), Volume 7, Issue 1, pp. 60—96, February 2004.
[21] Y. Kim, A. Perrig, and G. Tsudik, “Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups,” Proceedings of the 7th ACM conference on Computer and communications security CCS '00, pp. 235—244, November 2000.
[22] Y. Wang, D. Damodaran, P.- D. Le, “Efficient Group Key Management in Wireless Networks,” Information Technology: New Generations, 2006, pp. 432—439, April 2006.
[23] Y. Wang, J. Li, L. Tie, and Q. Li, “An Efficient Key Management for Large Dynamic Groups,” Communication Networks and Services Research, pp. 131—136, May 2004.
[24] FIPS 180-2. Secure Hash Standard (SHS), National Institute of Standards and Technologies, August 2002.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29853-
dc.description.abstract群組金鑰管理是安全的多重傳送訊息架構中不可或缺的要素,在2005年11月,林振群等學者提出了一個稱為「One-Way Key Derivation (OKD)」的有效率之機制,此機制利用了樹狀結構來管理金鑰,我們發現在此機制中,當有成員加入一個樹的高度為x的群組時,新成員必須解密O(x)次而求得群組金鑰,另一方面,當有成員離開群組時,其他成員必須解密O(x)次求得群組金鑰,對於運算能力較差的裝置而言,解密是高花費的運算,在此情況下,當有成員異動時,群組成員不能迅速得知新的群組金鑰,因此他們不能立即加密訊息接著傳送出去或是立即解密而得知收到的訊息,尤其是當傳送很緊急的訊息時,此機制對於群組成員是沒有效率的。
在此我們提出了針對OKD而改進的高效率之金鑰包裝機制,在新的機制中,新加入的成員只需一次的解密運算即可求得群組金鑰,另一方面,當有成員離開群組時,我們的機制把解密運算更換為更快速的雜湊運算;和OKD比起來,我們的機制使得群組成員可以更快速地得到新的群組金鑰。
zh_TW
dc.description.abstractGroup key management is an essential component of secure multicast architecture. An efficient group key management protocol called One-Way Key Derivation (OKD), proposed by Lin et al. in 2005, uses a tree to manage keys. We find that in OKD, when a member joins a group with key tree height x, the new member has to decrypt O(x) times to get the new group key. On the other hand, when a member leaves the group, other group members have to decrypt O(x) times to get the new group key. For devices with limited computational capabilities, decryption is a costly operation. In these situations, the group members cannot derive the new group key fast enough when membership changes. Therefore, they can neither encrypt and send messages nor decrypt to get the received messages immediately. It is inefficient for group members, especially when the message is very urgent.
In this paper, we propose an efficient key packaging scheme for group key management based on OKD. In our scheme, a new group member only needs one decryption to get the new group key. On the contrary, our scheme replaces decryption operations with faster hash operations when a member leaves the group, so it allows group members to derive the new group key more quickly than OKD.
en
dc.description.provenanceMade available in DSpace on 2021-06-13T01:21:45Z (GMT). No. of bitstreams: 1
ntu-96-R94944013-1.pdf: 1050455 bytes, checksum: 5e4b042a766ce99ed96a4d392b2b8d4b (MD5)
Previous issue date: 2007
en
dc.description.tableofcontents1 Introduction...................................1
2 Related Works..................................4
2.1 Group Key Management Protocol...,,.........4
2.2 Logical Key Hierarchy......,,..............6
2.3 One-Way Key Derivation..,,.................9
3 Key Packaging Scheme..........................12
3.1 Motivation................................12
3.1.1 An Example of OKD.....................13
3.1.2 Inefficiency of OKD...................15
3.1.3 An Example of KPS (Join)..............16
3.1.4 An Example of KPS (Leave).............17
3.1.5 A simple Comparison of OKD and KPS....19
3.2 Methods to Package Keys...................20
3.2.1 When a Member Joins...................20
3.2.2 When a Member Leaves..................20
4 Analysis of KPS...............................22
4.1 Security of KPS...........................22
4.2 Efficiency of KPS.........................23
5 Conclusions...................................24
References 25
dc.language.isozh-TW
dc.title群組金鑰管理中高效率之金鑰包裝機制zh_TW
dc.titleEfficient Key Packaging Schemes for Group Key Managementen
dc.typeThesis
dc.date.schoolyear95-2
dc.description.degree碩士
dc.contributor.oralexamcommittee黃秋煌,劉立,莊文勝
dc.subject.keyword群組金鑰管理,安全群播,安全群組溝通,樹狀結構金鑰管理,邏輯式階層金鑰管理,雜湊函數,zh_TW
dc.subject.keywordgroup key management,secure multicast,secure group communication,tree-based key management,Logical Key Hierarchy (LKH),hash function,en
dc.relation.page28
dc.rights.note有償授權
dc.date.accepted2007-07-18
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊網路與多媒體研究所zh_TW
顯示於系所單位:資訊網路與多媒體研究所

文件中的檔案:
檔案 大小格式 
ntu-96-1.pdf
  目前未授權公開取用
1.03 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved