Font Size: a A A

Research On Conference-Key Management Technology

Posted on:2008-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:Z TuFull Text:PDF
GTID:2178360272468780Subject:Information security
Abstract/Summary:PDF Full Text Request
With the increase in bandwidth and size of large group communication, application of Conference-key become more popular, and research on key management technology have got more and more attention.Conference-key establishment is divided into Conference-key distribution and Conference-key agreement. Key distribution protocol requires conference key proposed by conference chairman on whom the key's security depends. However, with less information communication, key agreement protocol is established by each member and demands larger communication expenses between each members.After the study on conference-key distribution protocol, I have given a conference key distribution protocol based on identification and threshold. Not the same as traditional distribution protocol, parameter selection of this protocol relates to user's ID, and we say it is safe because BDH problem is hard to solve. But it can not satisfy the needs of adaptation to mobile conference, if some participants join or leave the conference when the conference is held, it will lead the conference to be stopped.Conference-key agreement is the focus of key management technology research, after comparing between 5 representative key agreement protocols(CKD protocol, BD protocol, STR protocol, GDH protocol and TGDH protocol) in recent days, They are not able to be the best in quality and efficiency at the same time. On the basis of BD protocol which is suitable to group communication in express local area network, I have proposed a E-BD protocol under ellipse curve. Then, by using bilinear parings, I have advanced a conference key agreement scheme based on user's ID. This scheme not only maintains the advantages of security and simple verification, but also makes the user's ID verification and transmission of key agreement carried out simultaneously. Besides, it enhances communication efficiency and reduces calculation expenses and can effectively resist replaying attacks,conspiratorial impersonation attacks,impersonators attacks and man-in-the-middle attacks, The attendance and absence of members in the middle of the conference will not affect the conference and it is practical to the multi-parties communications through the network..
Keywords/Search Tags:Conference-key distribution, Conference-key agreement, User ID
PDF Full Text Request
Related items