{"title":"具有非可信权限的组安全通信策略","authors":"Li Wang, Tian Wang","doi":"10.1109/ITAPP.2010.5566612","DOIUrl":null,"url":null,"abstract":"This paper proposes a strategy on group security communication with non-Trusted Authority, based on Shamir threshold secret-shared cryptosystem [1] and pairs of generators. In this strategy, the keys of nodes and group are co-produced by all the nodes within the group after consulting together [2]. Once the keys have been produced, their validity can be authenticated by each of them, which can be used in detecting the malicious nodes effectively. The periodic update of the node keys and group key has been described as well in this paper. Above all, the passive and active attack can be resisted; the network could run in a safer condition because of the strategy.","PeriodicalId":116013,"journal":{"name":"2010 International Conference on Internet Technology and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Group Security Communication Strategy with Non-Trusted Authority\",\"authors\":\"Li Wang, Tian Wang\",\"doi\":\"10.1109/ITAPP.2010.5566612\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a strategy on group security communication with non-Trusted Authority, based on Shamir threshold secret-shared cryptosystem [1] and pairs of generators. In this strategy, the keys of nodes and group are co-produced by all the nodes within the group after consulting together [2]. Once the keys have been produced, their validity can be authenticated by each of them, which can be used in detecting the malicious nodes effectively. The periodic update of the node keys and group key has been described as well in this paper. Above all, the passive and active attack can be resisted; the network could run in a safer condition because of the strategy.\",\"PeriodicalId\":116013,\"journal\":{\"name\":\"2010 International Conference on Internet Technology and Applications\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Internet Technology and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITAPP.2010.5566612\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Internet Technology and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITAPP.2010.5566612","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Group Security Communication Strategy with Non-Trusted Authority
This paper proposes a strategy on group security communication with non-Trusted Authority, based on Shamir threshold secret-shared cryptosystem [1] and pairs of generators. In this strategy, the keys of nodes and group are co-produced by all the nodes within the group after consulting together [2]. Once the keys have been produced, their validity can be authenticated by each of them, which can be used in detecting the malicious nodes effectively. The periodic update of the node keys and group key has been described as well in this paper. Above all, the passive and active attack can be resisted; the network could run in a safer condition because of the strategy.