Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34014
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor雷欽隆
dc.contributor.authorHung-Jen Wuen
dc.contributor.author吳弘仁zh_TW
dc.date.accessioned2021-06-13T05:51:37Z-
dc.date.available2006-07-27
dc.date.copyright2006-07-27
dc.date.issued2006
dc.date.submitted2006-07-04
dc.identifier.citation[1] S. Deering, “Multicast Routing in Internetworks and Extended LANs,” ACM SIGCOMM, 1988.
[2] T. Ballardie and J. Crowcroft, “Multicast-Specific Security Threats and Counter-Measures,” Symposium on Network and Distributed System Security, pp. 2-16, 1995.
[3] A. Bakkardie, “Scalable multicast key distribution,' RFC 1949, 1996.
[4] A. Beimel and B. Chor, “Communications in key distribution schemes,' IEEE Transactions on Information Theory, vol. 42, pp.19-28, 1996.
[5] C. Blundo and A. Cresti, “Space requirements for broadcast encryption,' Advances in Cryptology - EUROCRYPT'94, LNCS, Springer, vol. 950, pp.287-298, 1995.
[6] C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vac-caro, and M. Yung, “Perfect secure key distribution for dynamic conferences,' Advances in Cryptology - CRYPTO'92, LNCS, Springer, vol. 740, pp. 471-486, 1993.
[7] I. F. Bob Briscoe, “Nark: Receiver-based multicast non-repudiation and key management,' Proceedings of the 1st ACM conference on Electronic commerce, pp. 22-30, Nov. 1999.
[8] G. Caronni, K. Waldvogel, D. Sun, and B. Plattner, “Efficient security for large and dynamic multicast groups,' Proceedings of the Seventh IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 376-383, 1998.
[9] W. Chen and L. R. Dondeti, “Recommendations in using group key management algorithms,' DARPA Information Survivability Conference and Exposition, vol. 2, pp. 222-227, 2003.
[10] L. R. Dondeti, S. Mukherjee, and A. Samal, “A dual encryption protocol for scalable secure multicasting,' In Fourth IEEE Symposium on Computers and Communications, pp. 2-8, 1999.
[11] S. M. Ghanem and H. Abdel-Wahab, “A secure group key management framework: Design and rekey issues,' Eighth IEEE International Symposium on Computers and Communications, pp. 797-802, 2003.
[12] H. Hamey and C. Muckenhim, “Group Key Management Protocol (GKMP) Specication,' RCF 2093, 1997.
[13] C.-S. Park and D.-H. Lee, “Secure and efficient key management for dynamic multicast groups,' ACM SIGOPS Operating Systems Review, vol. 35, pp. 32-38, 2001.
[14] A. T. Sherman and D. A. McGrew, “Key establishment in large dynamic groups using one-way function trees,' IEEE transactions on Software Engineering, vol. 29, pp. 444-458, May 2003.
[15] D. R. Stinson, “On some methods for unconditionally secure key distribution and broadcast encryption,' Design, Codes and Cryptography, vol. 12, pp. 215-243, 1997.
[16] S. Zhu, S. Setia, and S. Jajodia, “Performance optimizations for group key management schemes,' 23rd International Conference on Distributed Computing Systems, pp. 163-171, 2003.
[17] Whit Diffie and Martin Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, pp. 644-654, 1976.
[18] M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman key distribution extended to group communication,” ACM Conference on Computer and Communications Security, pp. 31-37, 1996.
[19] S. Rafaeli, and D. Huchison, “A Survey of Key Management for Secure Group Communication,” ACM Computing Surveys, vol.35, no.3, pp. 309–329, 2003.
[20] P. Adusumilli, X. Zou, and B. Ramamurthy, “DGKD: Distributed Group Key Distribution with Authentication Capability,” Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, pp. 286–293, 2005.
[21] D. Wallner, E. Harder, and R. Agee, “Key management for multicast: Issues and architectures,” RFC 2627, 1999.
[22] C.K. Wong, M. Gouda, and S.S. Lam, “Secure group communications using key graphs,” IEEE/ACM Transactions on Networking, pp. 16–30, 2000.
[23] S. Mittra, “Iolus: A framework for scalable secure multicasting,” in Proceedings of the ACM SIGCOMM, vol. 27, pp.277-288, 1997.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34014-
dc.description.abstract分散式金鑰管理機制在群組金鑰管理之中是一種新的構想。在這類架構中,一個群組不需要任何管理者,且金鑰由個別群組成員產生。Adusumilli et al.學者提出了這類架構中的第一個機制,稱分散式群組金鑰散佈機制,簡稱DGKD。在DGKD之中,群組成員可能扮演兩種角色。一為志願者,負責產生金鑰,二為協助者,以幫助志願者散佈金鑰。當有新群組成員加入,或舊群組成員離開時,各個成員須重新決定角色,因此每個成員須在本地端儲存一個共同的組群樹。
在 DGKD 機制中,我們發現了兩個儲存空間上的問題。一是多餘的金鑰,一是多餘的群組資訊。這樣的問題使得儲存空間無法有效運用。基於DGKD 機制,我們提出了一個新的分散式金鑰管理機制,利用部份群組結構資訊達到高效率分散式群組金鑰管理,簡稱 EDGE。每個成員僅須儲存部份的群組資訊。在不失去安全性的前提下,EDGE的群組資訊結構比DGKD有彈性,而我們更進一步地證明了 EDGE 比 DGKD 需要較少的儲存空間,以及較短的更新金鑰時間。
zh_TW
dc.description.abstractDistributed group key management scheme (DGMS) is a new class of group key management protocols. In DGMS, there is no group controller and keys are generated by members individually. Adusumilli et al. proposed the first DGMS scheme, distributed group key distribution (DGKD). In DGKD, members play roles of sponsors to generate keys, or co-distributors to help distribute keys. Sponsors and co-distributors are re-determined when members join or leave. So every member stores a common group tree locally.
We observe two storage problems in DGKD, redundant keys and group information. This disadvantage makes storage extremely unscalable when membership changes. Based on DGKD, we propose a new DGMS scheme, EDGE. Each member stores only partial group information individually. Structure of EDGE is more flexible than the structure of DGKD without losing security. Furthermore, we prove that EDGE is more efficient than DGKD in storage and re-keying time.
en
dc.description.provenanceMade available in DSpace on 2021-06-13T05:51:37Z (GMT). No. of bitstreams: 1
ntu-95-R93921027-1.pdf: 312254 bytes, checksum: fb3e4153810ebaa1c3bbaf4f49fe5778 (MD5)
Previous issue date: 2006
en
dc.description.tableofcontents1 Introduction 6
2 Related work 9
2.1 Logic Key Hierarchy 9
2.2 Iolus 12
2.3 Group Diffie-Hellman Key Distribution 14
2.4 Distributed Group Key Distribution 17
2.5 DGKD-KEYSETUP protocol 18
2.6 DGKD-JOIN protocol 19
2.7 DGKD-LEAVE Protocol 21
2.8 DGKD Scalability Problems 22
3 An Efficient Distributed Group Key Management Scheme with Partial Group-Hierarchy Knowledge 23
3.1 Overview of EDGE 23
3.2 EDGE-KEYSETUP Protocol 25
3.3 EDGE-JOIN Protocol 27
3.4 EDGE-LEAVE Protocol 29
3.5 Discussion and Proofs 30
4 Security Analysis 35
4.1. Assumptions 35
4.2. Backward Secrecy 35
4.3. Forward Secrecy 36
5 Comparison 37
6 Conclusions 40
dc.language.isoen
dc.subject金鑰管理zh_TW
dc.subject群組通訊zh_TW
dc.subject金鑰管理zh_TW
dc.subject群組資訊zh_TW
dc.subject分散式群組zh_TW
dc.subjectdistributed groupen
dc.subjectkey managementen
dc.subjectgroup communicationen
dc.subjectgroup keyen
dc.subjectgroup informationen
dc.title利用部份群組結構資訊之高效率分散式群組金鑰管理機制zh_TW
dc.titleAn Efficient Distributed Group Key Management Scheme with Partial Group-Hierarchy Knowledgeen
dc.typeThesis
dc.date.schoolyear94-2
dc.description.degree碩士
dc.contributor.oralexamcommittee范俊逸,黃秋煌,顏嗣鈞,莊仁輝
dc.subject.keyword群組通訊,金鑰管理,群組資訊,分散式群組,金鑰管理,zh_TW
dc.subject.keywordgroup communication,group key,group information,distributed group,key management,en
dc.relation.page43
dc.rights.note有償授權
dc.date.accepted2006-07-06
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-95-1.pdf
  未授權公開取用
304.94 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved