Font Size: a A A

Design And Implementation Of A Multicast Key Distribution Protocol With User Anonymity

Posted on:2017-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:K TaiFull Text:PDF
GTID:2308330488464338Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
Multicast is a kind of communication technology different from unicast. It adopts the "one to many" communication mode. In real life, many new applications such as video on demand, distance learning and networking using multicast communication technology. In the face of the wide application of multicast technology, the security of multicast communication is very important, in which the key management scheme is one of the core issues of multicast security.However, the research on multicast key management is mainly focused on how to reduce the amount of key storage and improve the efficiency of encryption and decryption, and ignore the inherent attributes of multicast communication technology. Exactly said that the focus of these studies sender multicast group provides the necessary security requirements, but ignore the privacy of the multicast group members. In the implementation of the classic LKH protocol, the identity information of the dynamic change member is directly to plaintext forms exist in key update information, assuming that the eavesdropper gets the key to update the information, although he is not able to get any valid data, but it can easily access to membership information. This will lead to a member of the privacy leak.This paper analyzes the existing research, and deeply studies the LKH protocol, and analyzes its advantages and disadvantages. Then, based on the problem of privacy disclosure, design a group key distribution protocol with user anonymity. First, in the implementation of the LKH protocol, design a kind of improve the multicast group member’s decryption efficiency number form. This numbering forms from the similar Huffman coding, for key binary tree for each tree node number, so that you can improve key updating efficiency. Secondly, according to the problem of privacy disclosure, the index matching algorithm is designed, which is based on the calculation of pseudo random function, which will be "hidden" in the classic LKH protocol ". This supports user anonymity, to avoid the issue of membership information leakage occurred. Finally, the improved protocol is implemented, and the related computation overhead and storage overhead are analyzed, and the feasibility of the protocol is verified. Through these, the improved protocol can meet the application in the real life, which is beneficial to the popularization and application of the multicast communication technology.
Keywords/Search Tags:Multicast key management, LKH protocol, User anonymity, Index matching algorithm
PDF Full Text Request
Related items