{"title":"基于几何方法的安全群通信系统密钥分配","authors":"Lina Ge","doi":"10.1109/ICFN.2010.51","DOIUrl":null,"url":null,"abstract":"A key assignment scheme for a secure group communication system based on a geometric approach is proposed. Members obtain the group key by solving multiple linear equations, using both the public information on the notice board and the secret information of their own. The proposed scheme can be divided into three phases: user registration, group key assignment, and group key computation. In the user registration phase, the group controller computes and gives a secret to the new user based on geometric approaches. In the group key assignment phase, the group controller first constructs a secret circle using the group key. Then it computes a shadow of group key for each member based on the shared secret. Finally, each member obtains an additional secret point based on the shared secret. The member obtains the group key in the group key computation phase by its shadow and the public information. The experimental results show that the computation of this scheme is simple and fast. It is dynamic because not only initial key distribution, but also auxiliary operations, such as members joining, members leaving, the group key updating are implemented. The forward secrecy and backward secrecy are assured.","PeriodicalId":185491,"journal":{"name":"2010 Second International Conference on Future Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Geometric Approaches-Based Key Assignment for Secure Group Communication System\",\"authors\":\"Lina Ge\",\"doi\":\"10.1109/ICFN.2010.51\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A key assignment scheme for a secure group communication system based on a geometric approach is proposed. Members obtain the group key by solving multiple linear equations, using both the public information on the notice board and the secret information of their own. The proposed scheme can be divided into three phases: user registration, group key assignment, and group key computation. In the user registration phase, the group controller computes and gives a secret to the new user based on geometric approaches. In the group key assignment phase, the group controller first constructs a secret circle using the group key. Then it computes a shadow of group key for each member based on the shared secret. Finally, each member obtains an additional secret point based on the shared secret. The member obtains the group key in the group key computation phase by its shadow and the public information. The experimental results show that the computation of this scheme is simple and fast. It is dynamic because not only initial key distribution, but also auxiliary operations, such as members joining, members leaving, the group key updating are implemented. The forward secrecy and backward secrecy are assured.\",\"PeriodicalId\":185491,\"journal\":{\"name\":\"2010 Second International Conference on Future Networks\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-01-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Future Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICFN.2010.51\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Future Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFN.2010.51","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Geometric Approaches-Based Key Assignment for Secure Group Communication System
A key assignment scheme for a secure group communication system based on a geometric approach is proposed. Members obtain the group key by solving multiple linear equations, using both the public information on the notice board and the secret information of their own. The proposed scheme can be divided into three phases: user registration, group key assignment, and group key computation. In the user registration phase, the group controller computes and gives a secret to the new user based on geometric approaches. In the group key assignment phase, the group controller first constructs a secret circle using the group key. Then it computes a shadow of group key for each member based on the shared secret. Finally, each member obtains an additional secret point based on the shared secret. The member obtains the group key in the group key computation phase by its shadow and the public information. The experimental results show that the computation of this scheme is simple and fast. It is dynamic because not only initial key distribution, but also auxiliary operations, such as members joining, members leaving, the group key updating are implemented. The forward secrecy and backward secrecy are assured.