Font Size: a A A

Research On Distributed Key Agreement Protocols For Secure Group Communication

Posted on:2012-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:C Z LiFull Text:PDF
GTID:2178330332492248Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the continuous development of distributed technology, the secure group communication becomes more and more important. In a secure group communication the most important thing is to ensure the secrecy of communication data. This requires that group members have a shared session key to encrypt the communication data. With the development of P2P and other distributed technology, the research based on complete distributed security for key agreement of group communication is becoming increasingly important. In the study of existing distributed group key agreement protocol this paper make great improvement, not only to maintain the advantages of the original protocols, but also put forward new ideas, make up the weakness of the original program. Our research mainly in the following two aspects:(1)Proposed a protocol based on the BD authentication protocols and tree based distributed group key agreement protocol T-BD. Join'the BD protocol combined with the logical key tree, although when the protocol begins, there are a number of communications and computing cost, but the protocol can guarantee the integrity of the internal nodes, but also reduces the communication and computation cost when the members join and leave.it can be efficiently handle members joining and leaving. Our protocol can make the internal malicious node can't launch the initiative to attack. Round efficiency of our protocols and computation cost aspects of the mode indices are significantly reduced compared to the original protocol, and our protocols have better scalability, better suited to the group key agreement of popular P2P applications.(2) Based on password authenticated key agreement, the paper combines the logical key tree structure with password-based group key agreement to put forward a secure and efficient password-based authentication group key agreement protocol. Agreement with less computational by introducing password encryption technology, realize the authentication of the agreement of protocol. At the same time as the introduction of the logical-tree thought, by sacrificing part of communication reduce the consultation and calculating costs. Finally the analysis and testing show that our protocol has obvious advantages compare with other popular distributed group key agreement protocol.
Keywords/Search Tags:distribution, security of group communication, group key agreement, logical key-tree
PDF Full Text Request
Related items