請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34014完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 雷欽隆 | |
| dc.contributor.author | Hung-Jen Wu | en |
| dc.contributor.author | 吳弘仁 | zh_TW |
| dc.date.accessioned | 2021-06-13T05:51:37Z | - |
| dc.date.available | 2006-07-27 | |
| dc.date.copyright | 2006-07-27 | |
| dc.date.issued | 2006 | |
| dc.date.submitted | 2006-07-04 | |
| dc.identifier.citation | [1] S. Deering, “Multicast Routing in Internetworks and Extended LANs,” ACM SIGCOMM, 1988.
[2] T. Ballardie and J. Crowcroft, “Multicast-Specific Security Threats and Counter-Measures,” Symposium on Network and Distributed System Security, pp. 2-16, 1995. [3] A. Bakkardie, “Scalable multicast key distribution,' RFC 1949, 1996. [4] A. Beimel and B. Chor, “Communications in key distribution schemes,' IEEE Transactions on Information Theory, vol. 42, pp.19-28, 1996. [5] C. Blundo and A. Cresti, “Space requirements for broadcast encryption,' Advances in Cryptology - EUROCRYPT'94, LNCS, Springer, vol. 950, pp.287-298, 1995. [6] C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vac-caro, and M. Yung, “Perfect secure key distribution for dynamic conferences,' Advances in Cryptology - CRYPTO'92, LNCS, Springer, vol. 740, pp. 471-486, 1993. [7] I. F. Bob Briscoe, “Nark: Receiver-based multicast non-repudiation and key management,' Proceedings of the 1st ACM conference on Electronic commerce, pp. 22-30, Nov. 1999. [8] G. Caronni, K. Waldvogel, D. Sun, and B. Plattner, “Efficient security for large and dynamic multicast groups,' Proceedings of the Seventh IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 376-383, 1998. [9] W. Chen and L. R. Dondeti, “Recommendations in using group key management algorithms,' DARPA Information Survivability Conference and Exposition, vol. 2, pp. 222-227, 2003. [10] L. R. Dondeti, S. Mukherjee, and A. Samal, “A dual encryption protocol for scalable secure multicasting,' In Fourth IEEE Symposium on Computers and Communications, pp. 2-8, 1999. [11] S. M. Ghanem and H. Abdel-Wahab, “A secure group key management framework: Design and rekey issues,' Eighth IEEE International Symposium on Computers and Communications, pp. 797-802, 2003. [12] H. Hamey and C. Muckenhim, “Group Key Management Protocol (GKMP) Specication,' RCF 2093, 1997. [13] C.-S. Park and D.-H. Lee, “Secure and efficient key management for dynamic multicast groups,' ACM SIGOPS Operating Systems Review, vol. 35, pp. 32-38, 2001. [14] A. T. Sherman and D. A. McGrew, “Key establishment in large dynamic groups using one-way function trees,' IEEE transactions on Software Engineering, vol. 29, pp. 444-458, May 2003. [15] D. R. Stinson, “On some methods for unconditionally secure key distribution and broadcast encryption,' Design, Codes and Cryptography, vol. 12, pp. 215-243, 1997. [16] S. Zhu, S. Setia, and S. Jajodia, “Performance optimizations for group key management schemes,' 23rd International Conference on Distributed Computing Systems, pp. 163-171, 2003. [17] Whit Diffie and Martin Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, pp. 644-654, 1976. [18] M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman key distribution extended to group communication,” ACM Conference on Computer and Communications Security, pp. 31-37, 1996. [19] S. Rafaeli, and D. Huchison, “A Survey of Key Management for Secure Group Communication,” ACM Computing Surveys, vol.35, no.3, pp. 309–329, 2003. [20] P. Adusumilli, X. Zou, and B. Ramamurthy, “DGKD: Distributed Group Key Distribution with Authentication Capability,” Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, pp. 286–293, 2005. [21] D. Wallner, E. Harder, and R. Agee, “Key management for multicast: Issues and architectures,” RFC 2627, 1999. [22] C.K. Wong, M. Gouda, and S.S. Lam, “Secure group communications using key graphs,” IEEE/ACM Transactions on Networking, pp. 16–30, 2000. [23] S. Mittra, “Iolus: A framework for scalable secure multicasting,” in Proceedings of the ACM SIGCOMM, vol. 27, pp.277-288, 1997. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/34014 | - |
| dc.description.abstract | 分散式金鑰管理機制在群組金鑰管理之中是一種新的構想。在這類架構中,一個群組不需要任何管理者,且金鑰由個別群組成員產生。Adusumilli et al.學者提出了這類架構中的第一個機制,稱分散式群組金鑰散佈機制,簡稱DGKD。在DGKD之中,群組成員可能扮演兩種角色。一為志願者,負責產生金鑰,二為協助者,以幫助志願者散佈金鑰。當有新群組成員加入,或舊群組成員離開時,各個成員須重新決定角色,因此每個成員須在本地端儲存一個共同的組群樹。
在 DGKD 機制中,我們發現了兩個儲存空間上的問題。一是多餘的金鑰,一是多餘的群組資訊。這樣的問題使得儲存空間無法有效運用。基於DGKD 機制,我們提出了一個新的分散式金鑰管理機制,利用部份群組結構資訊達到高效率分散式群組金鑰管理,簡稱 EDGE。每個成員僅須儲存部份的群組資訊。在不失去安全性的前提下,EDGE的群組資訊結構比DGKD有彈性,而我們更進一步地證明了 EDGE 比 DGKD 需要較少的儲存空間,以及較短的更新金鑰時間。 | zh_TW |
| dc.description.abstract | Distributed group key management scheme (DGMS) is a new class of group key management protocols. In DGMS, there is no group controller and keys are generated by members individually. Adusumilli et al. proposed the first DGMS scheme, distributed group key distribution (DGKD). In DGKD, members play roles of sponsors to generate keys, or co-distributors to help distribute keys. Sponsors and co-distributors are re-determined when members join or leave. So every member stores a common group tree locally.
We observe two storage problems in DGKD, redundant keys and group information. This disadvantage makes storage extremely unscalable when membership changes. Based on DGKD, we propose a new DGMS scheme, EDGE. Each member stores only partial group information individually. Structure of EDGE is more flexible than the structure of DGKD without losing security. Furthermore, we prove that EDGE is more efficient than DGKD in storage and re-keying time. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-13T05:51:37Z (GMT). No. of bitstreams: 1 ntu-95-R93921027-1.pdf: 312254 bytes, checksum: fb3e4153810ebaa1c3bbaf4f49fe5778 (MD5) Previous issue date: 2006 | en |
| dc.description.tableofcontents | 1 Introduction 6
2 Related work 9 2.1 Logic Key Hierarchy 9 2.2 Iolus 12 2.3 Group Diffie-Hellman Key Distribution 14 2.4 Distributed Group Key Distribution 17 2.5 DGKD-KEYSETUP protocol 18 2.6 DGKD-JOIN protocol 19 2.7 DGKD-LEAVE Protocol 21 2.8 DGKD Scalability Problems 22 3 An Efficient Distributed Group Key Management Scheme with Partial Group-Hierarchy Knowledge 23 3.1 Overview of EDGE 23 3.2 EDGE-KEYSETUP Protocol 25 3.3 EDGE-JOIN Protocol 27 3.4 EDGE-LEAVE Protocol 29 3.5 Discussion and Proofs 30 4 Security Analysis 35 4.1. Assumptions 35 4.2. Backward Secrecy 35 4.3. Forward Secrecy 36 5 Comparison 37 6 Conclusions 40 | |
| dc.language.iso | en | |
| dc.subject | 金鑰管理 | zh_TW |
| dc.subject | 群組通訊 | zh_TW |
| dc.subject | 金鑰管理 | zh_TW |
| dc.subject | 群組資訊 | zh_TW |
| dc.subject | 分散式群組 | zh_TW |
| dc.subject | distributed group | en |
| dc.subject | key management | en |
| dc.subject | group communication | en |
| dc.subject | group key | en |
| dc.subject | group information | en |
| dc.title | 利用部份群組結構資訊之高效率分散式群組金鑰管理機制 | zh_TW |
| dc.title | An Efficient Distributed Group Key Management Scheme with Partial Group-Hierarchy Knowledge | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 94-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 范俊逸,黃秋煌,顏嗣鈞,莊仁輝 | |
| dc.subject.keyword | 群組通訊,金鑰管理,群組資訊,分散式群組,金鑰管理, | zh_TW |
| dc.subject.keyword | group communication,group key,group information,distributed group,key management, | en |
| dc.relation.page | 43 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2006-07-06 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-95-1.pdf 未授權公開取用 | 304.94 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
