Font Size: a A A

The Research Of Provable Secure Group Key Management And Its Application

Posted on:2022-12-17Degree:MasterType:Thesis
Country:ChinaCandidate:W D HanFull Text:PDF
GTID:2518306776992579Subject:Computer Software and Application of Computer
Abstract/Summary:PDF Full Text Request
In recent years,the development of the mobile Internet has brought many applications based on group communication,such as online conferences,social networks,and so on,which provides great convenience for human daily life and work.Secure group communication is also increasingly concerned by current society and has come to the foreground in current research.The establishment of a secure group communication channel can be realized by using group key management technology.Considering that the application scenarios are complex and changeable,group key management technology is also facing many challenges.This paper mainly discusses the application of group key management technology in Mobile Ad-hoc Networks and Distributed Online Social Networks.The existing group key management schemes in Mobile Ad-hoc Networks and Distributed Online Social Networks suffer the problem of receiver restriction,which means the sender can only send messages to all the entities,not a specific set of entities in the group.A way to break the receiver restriction is to apply contributory broadcast encryption,however,the existing contributory broadcast encryption schemes are usually based on the traditional public-key cryptosystem,which leads to the problem of the management of public-key certificates.Meanwhile,in Mobile Ad-hoc Networks,wireless nodes usually self-organize into groups to complete cooperative tasks.However,in Distributed Online Social Networks,users exchange information through discussion groups.A discussion group is initiated and maintained by a single user(group initiator),and user privacy needs to be considered.In response to these issues,this paper improves the existing group key management schemes according to the needs of entities in Mobile Ad-hoc Networks and Distributed Online Social Networks.The main contribution of this paper includes the following aspects:1.Based on the contributory broadcast encryption technology,aiming at the shortcomings of the existing group key management schemes for Mobile Ad-hoc Networks,a receiver-unrestricted group key management scheme for Mobile Ad-hoc Networks is proposed.The details are as follows:·Our scheme achieves a certain number of initial wireless nodes to establish a group and generate a group key by negotiation and supports the change of wireless nodes in the group.·The receiver restriction is broken so that the sender could choose the set of receivers.·The identity-based cryptography is utilized to avoid the cost of certificate management.·Our scheme satisfies the partial forward security and fully collusion resistance.·The efficiency of our scheme is evaluated through the simulation on the platform of Raspberry Pi,and the security of our scheme is proved.2.Based on the contributory broadcast encryption technology,aiming at the shortcomings of the existing group key management schemes for Distributed Online Social Networks,a group key management scheme for secure discussion group establishment in Distributed Online Social Networks is proposed.The details are as follows:·Our scheme allows a user to be a group initiator to form a discussion group and achieves the user joining or leaving.·User privacy is achieved by encrypting a user's join request when the user is joining a discussion group.·Three modes of secure group communication in Distributed Online Social Networks are proposed,including secure inside communication mode,secure outside-to-inside communication mode,and secure hybrid communication mode.·The identity-based cryptography is utilized to avoid the cost of certificate management.·Our scheme satisfies the partial forward security,user privacy protection and full collusion resistance.·The efficiency of our scheme is evaluated through the simulation on the platform of Raspberry Pi and PC,and the security of our scheme is proved.
Keywords/Search Tags:Secure group communication, Group key management, Mobile Ad-hoc Networks, Distributed Online Social Networks, Contributory broadcast encryption
PDF Full Text Request
Related items