透過您的圖書館登入
IP:3.141.47.221
  • 學位論文

利用部份群組結構資訊之高效率分散式群組金鑰管理機制

An Efficient Distributed Group Key Management Scheme with Partial Group-Hierarchy Knowledge

指導教授 : 雷欽隆

摘要


分散式金鑰管理機制在群組金鑰管理之中是一種新的構想。在這類架構中,一個群組不需要任何管理者,且金鑰由個別群組成員產生。Adusumilli et al.學者提出了這類架構中的第一個機制,稱分散式群組金鑰散佈機制,簡稱DGKD。在DGKD之中,群組成員可能扮演兩種角色。一為志願者,負責產生金鑰,二為協助者,以幫助志願者散佈金鑰。當有新群組成員加入,或舊群組成員離開時,各個成員須重新決定角色,因此每個成員須在本地端儲存一個共同的組群樹。 在 DGKD 機制中,我們發現了兩個儲存空間上的問題。一是多餘的金鑰,一是多餘的群組資訊。這樣的問題使得儲存空間無法有效運用。基於DGKD 機制,我們提出了一個新的分散式金鑰管理機制,利用部份群組結構資訊達到高效率分散式群組金鑰管理,簡稱 EDGE。每個成員僅須儲存部份的群組資訊。在不失去安全性的前提下,EDGE的群組資訊結構比DGKD有彈性,而我們更進一步地證明了 EDGE 比 DGKD 需要較少的儲存空間,以及較短的更新金鑰時間。

並列摘要


Distributed group key management scheme (DGMS) is a new class of group key management protocols. In DGMS, there is no group controller and keys are generated by members individually. Adusumilli et al. proposed the first DGMS scheme, distributed group key distribution (DGKD). In DGKD, members play roles of sponsors to generate keys, or co-distributors to help distribute keys. Sponsors and co-distributors are re-determined when members join or leave. So every member stores a common group tree locally. We observe two storage problems in DGKD, redundant keys and group information. This disadvantage makes storage extremely unscalable when membership changes. Based on DGKD, we propose a new DGMS scheme, EDGE. Each member stores only partial group information individually. Structure of EDGE is more flexible than the structure of DGKD without losing security. Furthermore, we prove that EDGE is more efficient than DGKD in storage and re-keying time.

參考文獻


[1] S. Deering, “Multicast Routing in Internetworks and Extended LANs,” ACM SIGCOMM, 1988.
[2] T. Ballardie and J. Crowcroft, “Multicast-Specific Security Threats and Counter-Measures,” Symposium on Network and Distributed System Security, pp. 2-16, 1995.
[4] A. Beimel and B. Chor, “Communications in key distribution schemes," IEEE Transactions on Information Theory, vol. 42, pp.19-28, 1996.
[8] G. Caronni, K. Waldvogel, D. Sun, and B. Plattner, “Efficient security for large and dynamic multicast groups," Proceedings of the Seventh IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 376-383, 1998.
[9] W. Chen and L. R. Dondeti, “Recommendations in using group key management algorithms," DARPA Information Survivability Conference and Exposition, vol. 2, pp. 222-227, 2003.

延伸閱讀