Font Size: a A A

Based On Secret Sharing Group Key Agreement Design And Simulation

Posted on:2013-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:C ZhaoFull Text:PDF
GTID:2248330374485421Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Network technology and the growing application needs promote the continuousdevelopment of information society and bring with it a number of convenient at thesame time, also expose a lot of security risks. A lot of sensitive information istransmitted through computer networks; information security has become an importantfactor in people’s livelihood. Cryptography is the key technologies of the InformationSecurity while key is the basis of secure communication, the only evidence of legitimateaccess.This dissertation aims to group key protocol establishment research, through theanalysis of a representative group key distribution protocol and group key agreementprotocol, combined with the secret sharing scheme, proposing a new efficient group keydistribution protocol based on secret sharing, and a new group key agreement protocolbased on secret sharing. The specific findings are as follows:First of all, an authenticated group key transfer protocol based on secret sharingproposed by Harn et al is described in detail and analyzed. The author also pointed outthat the agreement is in a serious shortage of efficiency under the circumstance ofgrowth in large number of users and can not adapt to situation of any number, a new andefficient group key distribution protocol (ESGKD protocol) is proposed againstdisadvantages described above.Secondly, a new secret sharing based group key exchange protocol (SGKEprotocol) above is proposed. The new agreement adopted a (n+1,2n) Shamir thresholdsecret sharing scheme, and new users can join the agreement at any time.Finally, the dissertation compared the proposed efficient group key distributionprotocol with authenticated group key transfer protocol based on secret sharingproposed by Harn et al and compared the proposed new secret sharing based group keyexchange protocol with BD protocol using the NS2simulation software, analyzed thefunction and efficiency of those procotols from a practical point of view.
Keywords/Search Tags:key distribution, key agreement, certification, secret sharing, simulation
PDF Full Text Request
Related items