{"title":"已知密钥攻击弹性集群密钥管理","authors":"Gowun Jeong, H. Yang, Sang-Soo Yeo, Yongho Seo","doi":"10.1109/BWCCA.2013.48","DOIUrl":null,"url":null,"abstract":"To improve the security of unicasting or multicasting within a cluster, a novel key reference scheme of a cluster-shared key chain for all the cluster members is proposed. Even though a cluster shares all the keys of a key chain, every member uniquely makes use of a different key out of the key chain as a one-time encrypting key and such a key is privately known by only its desirable receiver(s). We discuss its resource overheads in memory, communication and computation as well as resiliency against known-key attacks.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Known-Key Attack-Resilient Cluster Key Management\",\"authors\":\"Gowun Jeong, H. Yang, Sang-Soo Yeo, Yongho Seo\",\"doi\":\"10.1109/BWCCA.2013.48\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To improve the security of unicasting or multicasting within a cluster, a novel key reference scheme of a cluster-shared key chain for all the cluster members is proposed. Even though a cluster shares all the keys of a key chain, every member uniquely makes use of a different key out of the key chain as a one-time encrypting key and such a key is privately known by only its desirable receiver(s). We discuss its resource overheads in memory, communication and computation as well as resiliency against known-key attacks.\",\"PeriodicalId\":227978,\"journal\":{\"name\":\"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BWCCA.2013.48\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2013.48","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
To improve the security of unicasting or multicasting within a cluster, a novel key reference scheme of a cluster-shared key chain for all the cluster members is proposed. Even though a cluster shares all the keys of a key chain, every member uniquely makes use of a different key out of the key chain as a one-time encrypting key and such a key is privately known by only its desirable receiver(s). We discuss its resource overheads in memory, communication and computation as well as resiliency against known-key attacks.