Font Size: a A A

Secure Group Communication Based On Combined Publie Key And Threshold Secret Sharing

Posted on:2011-09-14Degree:MasterType:Thesis
Country:ChinaCandidate:X W WuFull Text:PDF
GTID:2178360308963939Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As the network communication technology and the further development of computer technology, the group communication network activities are becoming the indispensable business. The current group communication has been applied, including video conferencing, distributed data backup, the message subscription and publishing, and many other systems.This paper focuses on the security group communication system, a number of key technologies, including authentication, secret sharing, group key management. These key technologies pose a security group communication system, an important component.Authentication is made based on CPK, which is based on basic mathematical principles of elliptic curve discrete logarithm problem on a mathematical principle to build a public key and private key matrix, using a hash function and password to change the identity of the entity mapped to the matrix row coordinate and column coordinate sequence, and then follow the sequence of the matrix selection and combination of elements, generate a huge amount of public and private key pairs, to achieve identity-based ultra-large-scale production and distribution of keys. CPK's greatest strength lies in authentication by the key itself to prove the authenticity of identification does not require a third party to prove, only need to retain a small number of parameters can handle a large number of public-key, without the support of online databases. And the PKI certification program compared to this program to overcome their shortcomings, have higher security. Secret sharing scheme is a group key management program an important theoretical basis, while the group key management in group communication is the most challenging task.In this paper, based on Chinese remainder theorem and(2 , n)Shamir secret sharing of multicast key management program, which is a centralized Multicast Key Management Scheme for Planar, which overcome the existing GKMP programs in the user exit the system much less expensive, well suited for secure group communication systems.
Keywords/Search Tags:Group communication, Authentication, Secret Sharing, Group key management
PDF Full Text Request
Related items