CN102255724B - Hypergraph-model-based multicast key management method - Google Patents
Hypergraph-model-based multicast key management method Download PDFInfo
- Publication number
- CN102255724B CN102255724B CN201110185883.4A CN201110185883A CN102255724B CN 102255724 B CN102255724 B CN 102255724B CN 201110185883 A CN201110185883 A CN 201110185883A CN 102255724 B CN102255724 B CN 102255724B
- Authority
- CN
- China
- Prior art keywords
- key
- group
- hypergraph
- subgroup
- super limit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to the field of security related application of key management in an information security technology, in particular to a centralized key management method, which comprises (1) an establishment stage, (2) the addition of a member to key hypergraph updating and (3) the quitting of the member from the key hypergraph updating. When the member is added, three key updating messages are required by a hypergraph-based key management scheme and are given by formulae shown in the description. In the scheme, a hypergraph theory is utilized to effectively reduce a key storage space of a key server, the key storage space of the group member and server encryption overhead in the addition of the group member, ensure the forward security and backward security of a security group and achieve high extensibility.
Description
Technical field
The present invention relates to the safety-relevant applications field of key management in information security technology, relate in particular to a kind of centralized key Managed Solution.
Background technology
Effectively multicast key management scheme is the basis of safe multicasting.Cast communication must guarantee that legal person can receive multicast packet, guarantees that illegal entity can not receive multicast packet simultaneously.Meanwhile, cast communication should provide the security services such as the confidentiality of authentication, integrity check and data.These security mechanisms rely on the encryption of one or more keys to realize conventionally.Managing these keys is challenging difficult problems, adds continually or exits especially group membership.
Researcher has proposed the multicast key management scheme of some at present, mainly be divided three classes: 1. centralized key Managed Solution (Centralized group key management protocols), as document [1] (C.K.Wang, S.Lam, Secure group communication using key graph, IEEE/ACMTransaction on networking, 8 (1), pp16-30, 2000.). 2. distributing key managing project (Decentralized group key management protocols), as document [2] (Mittra.S, Iolus:A framework for scalable secure multicasting, ACMSIGCOMM, 27 (4), PP.227-288). 3. distributed key management scheme (Distributed group keymanagement protocols).As document [3] (Boyd.C, On key agreement and conferencekey agreement, In proceedings of the information security and privacy:Australasian conference.Lecture notes in computer science, vol.1270.Springer-Verlag, New York, pp.294-302,1997).
The present invention proposes a kind of centralized key managing project that is suitable for.The present invention utilizes Hypergraph Theory to set up safe multicasting key management model.Hypergraph H=(V, E) comprises vertex set V={v
1, v
2..., v
tand super limit set E={E
1, E
2..., E
m, every super limit E
ja nonvoid subset of V, and all super limit E
junion be V.E
jit is a finite aggregate and its radix k>=1.
In the present invention, member's cipher key relation can be regarded as a hypergraph H=(U, E), and U is member's set of a secure group, and a group membership regards a summit of hypergraph, E as
i(K
i) be group membership's subclass (super limit), have identical subgroup key (or group key) K
i∈ K.
Summary of the invention
Main purpose of the present invention is to provide a kind of centralized multicast key management scheme, and key server is responsible for generation, distribution, renewal of key etc.
Technical scheme of the present invention is as follows:
Suppose that the current whole network system is that safe and all members and key server are trusty.In the cipher key management procedures of carrying out, key server plays a part very important.
In order to simplify agreement below, use following symbol:
In agreement below, need to use following symbol: 1) if it is the member of that x → y:z represents 1. y, the transmission message z from x to y; If 2. y is that member gathers, the transmission of message z is exactly the each member in from x to y; 2) { m}
krepresent with key k encrypting messages m; 3) if A, B is two set,
Based on a key managing project for hypergraph, comprising:
(1) establishment stage
Be provided with the believable group of GC of control centre of a responsible group access control and key management, and this GC is group membership's distributed key and maintains the relation between member's key.First, GC sets up key hypergraph.The member of secure group is corresponding to the summit of key hypergraph, super limit E
i(K
i) representing member's set, and these member's shared Sub group keys K
i.A given key hypergraph H, super limit set (safe subgroup) intersects at summit GC between two.Key K of selection that GC is random
0, as the master key of secure group, and master key is distributed to all members safely.Group membership is certified and join in secure group, and each member and GC share a key u
i, be called member's individual key.
2) member adds key hypergraph to upgrade
Suppose that member u sends and joins request to GC.The permission if joined request, GC is the individual key k to member u by safe channel distribution
u.After this member adds secure group, a new secure group has just formed.GC must upgrade group key by the channel of safety, subgroup key carrys out more new key hypergraph, and member u joins in a subgroup and in this subgroup and adds summit u.
Agreeing to that u adds subgroup E
i(K
i) after, GC is new key hypergraph more.GC adds u-summit to super limit E
i(K
i), and by individual key k
ube distributed to safely u, in order to realize backward fail safe, the group key K of hypergraph
0with super limit E
i(K
i) subgroup key K
imust upgrade.Super limit comprises the super limit that adds member u, is referred to as to add excess of imports limit.
For backward fail safe, the group key and the subgroup key that add excess of imports limit must upgrade.GC generates at random new group key, adds after the subgroup key on excess of imports limit, and GC needs safely to legal group membership's distributed key updating message.
Key updating message is constructed in the following way.For member u, join a safe subgroup E
i(K
i), add excess of imports limit E
i(K
i) subgroup key K
imust upgrade group key K
0must upgrade and be sent to safely all legal group memberships.In addition the lastest imformation of key,
send to and add member u.
When a member adds fashionablely, based on the key managing project of hypergraph, need three key updating message, by lower formula, provided:
For a member, join a key hypergraph, IKMP is:
1) u → GC: join super limit E
i(K
i) request;
2) GC → u: certified member u, the generation individual key k that GC is random
uand distributed key k safely
ugive member u;
3) GC: new key K is organized in random generation
0' and subgroup key K
i' and carry out following steps;
(3) member exits the renewal of key hypergraph
Agree to the request of leaving of a member u, GC leaves by deleting u summit the super limit E that comprises member u
i(K
i) carry out more new key hypergraph.For forward security, group key and the subgroup key that leaves super limit need renewal, comprise the super limit of leaving member u and be called and leave super limit, GC and key updating message safety be distributed to corresponding group membership.
For the super limit E of leaving of member u
i(K
i), for forward security, leave the subgroup key K on super limit
ineed to upgrade, simultaneously group key K
0also need to upgrade.For leaving super limit E
3(K
3), the each member who leaves in super limit, must upgrade two keys, i.e. a subgroup key K
iwith a group key K
0.GC is by encrypting new key K with suitable key-encrypting key
0' and K
i'.As for other the super limit except leaving super limit, GC is by carrying out encrypted set key K with their subgroup key
0' build key updating message.These key updating message are multicasted to corresponding subgroup subsequently respectively.
The key hypergraph of key updating protocol leave to(for) a member u is represented by step below:
1) u → GC: super limit E is left in request
i(K
i)
2) GC → u: agree to leave;
3) GC: generate at random new group key K
0' and leave the subgroup key K on super limit
i';
If n=m × l, wherein n is the group membership's of secure group number.L is an integer and n is divided into l subgroup.This process need (l-1)+(m-1)=l+m-2 bar key updating message.The encryption overhead of GC is (l-1)+(m-1)=l+m-2, and wherein (l-1) expression (l-1) individual subgroup need to be upgraded their subgroup key; (m-1) represent (m-1) individual subgroup Ei member, need to utilize independently their individual key to upgrade their group key and subgroup key.
Beneficial effect of the present invention is as follows:
By n=m × l,
Now
So, when
The number of keys of key server storage is
wherein n individual key,
individual subgroup key and 1 group key.Document [1] (C.K.Wang, S.Lam, Secure group communication using keygraph, IEEE/ACM Transaction on networking, 8 (1), pp16-30,2000.) in scheme, the key of key server storage is [d/ (d-1)] × n, the degree that wherein d is key tree.The number of keys that each group membership need to store is 3, i.e. 1 group key, 1 subgroup key and one by one body key.Scheme in document [1], the number of keys that each group membership need to store is log
d n+ 1.When a member adds key hypergraph, the encryption overhead of key server is 3, sees that member adds key updating part.Scheme in document [1], when a member adds key tree, the encryption overhead of key server is 2log
d n-1.When a member exits key hypergraph, the encryption overhead of key server is
labor is shown in that member exits key updating part.Scheme in document [1], when a member exits key tree, the encryption overhead of key server is (d+2) (1og
2 n-1)/2.
So, the present invention and document [1] (C.K.Wang, S.Lam, Secure group communicationusing key graph, IEEE/ACM Transaction on networking, 8 (1), pp16-30,2000.) key tree is compared, and has reduced significantly the key storage expense of key server, (as when document [1] and the ratio of the key managing project storage overhead based on hypergraph model of our suggestion being
so the storage overhead of the key server of the key managing project based on hypergraph model is few); The storage overhead that has reduced group membership (is (log as worked as document [1] with the ratio of the key managing project storage overhead based on hypergraph model of our suggestion
d n+ 1): 3, as n → ∞, ratio trends towards infinity, so member's key storage expense of the key managing project based on hypergraph model is few) and reduced the encryption overhead that member adds fashionable key server (as the key managing project based on hypergraph model when document [1] and our suggestion when the ratio that a member adds the encryption overhead of fashionable key server be (2log
d n-1): 3, as n → ∞, ratio trends towards infinity, so that the member of the key managing project based on hypergraph model adds fashionable encryption overhead is few).
This scheme is utilized Hypergraph Theory, has effectively reduced the key storage space of key server, group membership's key storage space and group membership adds fashionable server for encrypting expense, has guaranteed safe group's forward and backward fail safe, is with good expansibility.The weak point of this scheme: cipher key service center is perfectly safe.
Accompanying drawing explanation
Fig. 1 is member u
10add the variation of rear key hypergraph.
Fig. 2 is member u
9the variation of the key hypergraph before and after leaving.
Embodiment
Below in conjunction with example, the present invention is described further.
(1) establishment stage
Be provided with the believable group of GC of control centre of a responsible group access control and key management, and this GC is group membership's distributed key and maintains the relation between member's key.First, GC sets up key hypergraph.The member of secure group has GC, u
1, u
2, u
3, u
4, u
5, u
6, u
7, u
8, u
9correspond respectively to the summit of key hypergraph, super limit E
1(K
1)={ u
1, u
2, u
3, u
4, E
2(K
2)={ u
5, u
6, E
3(K
3)={ u
7, u
8, u
9representing group membership's set, and these members shared Sub group key K respectively
1, K
2, K
3.A given key hypergraph H, super limit set (safe subgroup) intersects at summit GC between two.Key K of selection that GC is random
0, as the master key of secure group, and all being distributed to of master key safety members.Group membership is certified and enter into secure group, and each member and GC share a key k
i, (i=1,2 ..., 9), be called member's individual key.
(1) member adds key hypergraph to upgrade
As shown in Figure 1, suppose member u
10be agreed and join safe subgroup E
3(K
3).This adds excess of imports limit is E
3(K
3).Subgroup key is from K
3change to K
3', group key is from K
0change to K
0'.Member u
1, u
2, u
3, u
4, u
5, u
6need to upgrade group key K
0for K
0', member u
7, u
8, u
9and u
10need to upgrade respectively group key and subgroup key K
0, K
3for K
0', K
3'.
As shown in Figure 1, to member u
10join secure group, GC need to send key updating information below.
(2) member leaves the renewal of key hypergraph
As shown in Figure 2, suppose member u
9agree to leave secure group.In key hypergraph, leaving super limit is E
3(K
3).For forward security, group key is from K
0be updated to K
0', leave super limit E
3(K
3) subgroup key from K
3be updated to K
3'.Member u
1, u
2, u
3, u
4, u
5, u
6only need to upgrade group key from K
0to K
0', leave the member u on super limit
7and u
8need to upgrade respectively group key and subgroup key from K
0, K
3for K
0', K
3'.
After a member leaves, for distributed key updating message is safely given corresponding member.As shown in Figure 2, for member u
9leave key hypergraph, GC need to send following key updating message:
Claims (1)
1. the key management method for multicast based on hypergraph model, is characterized in that, described method is as follows:
Suppose that the current whole network system is that safe and all members and key server are trusty;
In agreement below, need to use following symbol: 1) if x → y:z represents that 1. y is a member, the transmission message z from x to y; If 2. y is that member gathers, the transmission of message z is exactly the each member in from x to y; 2) { m}
krepresent with key k encrypting messages m; 3) if A, B is two set,
This method comprises:
(1) establishment stage:
Be provided with the believable group of GC of control centre of a responsible group access control and key management, and this GC is group membership's distributed key and maintains the relation between member's key; First, GC sets up key hypergraph; The member of secure group is corresponding to the summit of key hypergraph, super limit E
i(K
i) representing member's set, and these member's shared Sub group keys K
i; A given key hypergraph H, super limit aggregation security subgroup intersects at summit GC between two; GC selects the master key K of secure group randomly
0, and master key is distributed to all members safely; Group membership is certified and join in secure group, and each member and GC share a key u
i, be called member's individual key;
(2) member adds key hypergraph to upgrade
Suppose that member u sends and joins request to GC; The permission if joined request, GC sends individual key k by safe channel
u; After member u adds secure group, a new secure group has just formed; GC must upgrade group key by the channel of safety, subgroup key carrys out more new key hypergraph, and member u joins in a subgroup and in this subgroup and adds summit u; Agreeing to that u adds subgroup E
i(K
i) after, GC is new key hypergraph more; GC adds u-summit to super limit E
i(K
i), and by individual key k
ube distributed to safely u, in order to realize backward fail safe, the group key K of hypergraph
0with super limit E
i(K
i) subgroup key K
ineed to upgrade; In the present invention, in super limit, comprise the super limit that adds member u, be referred to as to add excess of imports limit;
For a member, join key hypergraph, IKMP is as follows:
1) u → GC: join super limit E
i(K
i) request;
2) GC → u: certified member u, the generation individual key k that GC is random
uand distributed key k safely
ugive member u;
3) GC: produce at random new group key K
0' and subgroup key K
i' and carry out following steps;
6)GC→{u}:{K
0',K
i'}
k
(3) member exits the renewal of key hypergraph
Agree to the request of leaving of a member u, GC comprises the super limit E that leaves member u by deletion
i(K
i) the summit u of u carrys out more new key hypergraph; Comprise the super limit of leaving member u and be called and leave super limit, simultaneously GC by key updating message safety be distributed to corresponding group membership;
For the super limit E of leaving of member u
i(K
i), for forward security, leave the subgroup key K on super limit
ineed to upgrade, simultaneously group key K
0also need to upgrade; For leaving super limit E
i(K
i), the each member who leaves in super limit, must upgrade two keys, i.e. a subgroup key K
iwith a group key K
0; GC is by encrypting new key K with suitable key-encrypting key
0' and K
i'; As for other the super limit except leaving super limit, GC is by carrying out encrypted set key K with their subgroup key
0' build key updating message; These key updating message are multicasted to corresponding subgroup subsequently respectively;
The key hypergraph of key updating protocol leave to(for) a member u is represented by step below:
1) u → GC: super limit E is left in request
i(K
i)
2) GC → u: agree to leave;
3) GC: generate at random new group key K
0' and leave the subgroup key K on super limit
i';
5) for leaving super limit E
i(K
i) each member u
j, have u
j≠ u,
if n=m × s, wherein n is the group membership's of secure group number; S is an integer and n is divided into s subgroup; This process need (s-1)+(m-1)=s+m-2 bar key updating message; The encryption overhead of GC is (s-1)+(m-1)=s+m-2, and wherein (s-1) expression (s-1) individual subgroup need to be upgraded their subgroup key; (m-1) represent (m-1) individual subgroup E
imember, need to utilize their individual key to upgrade their group key and subgroup key independently.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110185883.4A CN102255724B (en) | 2011-07-04 | 2011-07-04 | Hypergraph-model-based multicast key management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110185883.4A CN102255724B (en) | 2011-07-04 | 2011-07-04 | Hypergraph-model-based multicast key management method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102255724A CN102255724A (en) | 2011-11-23 |
CN102255724B true CN102255724B (en) | 2014-05-07 |
Family
ID=44982731
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110185883.4A Expired - Fee Related CN102255724B (en) | 2011-07-04 | 2011-07-04 | Hypergraph-model-based multicast key management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102255724B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103970860B (en) * | 2014-05-07 | 2017-05-24 | 华为技术有限公司 | Method, device and system for processing data |
CN106169996B (en) * | 2016-07-04 | 2019-04-09 | 中国人民武装警察部队工程大学 | Multi-area optical network key management method based on key hypergraph and identification cipher |
CN106953727B (en) * | 2017-03-13 | 2019-09-10 | 南京邮电大学 | Group safety certifying method based on no certificate in D2D communication |
-
2011
- 2011-07-04 CN CN201110185883.4A patent/CN102255724B/en not_active Expired - Fee Related
Non-Patent Citations (4)
Title |
---|
C.K.Wang等.Secure group communication using key graph.《IEEE/ACM Transaction on networking》.2000,16-30. |
Secure group communication using key graph;C.K.Wang等;《IEEE/ACM Transaction on networking》;20000229;16-30 * |
张聚伟.无线传感器网络安全体系研究.《中国博士学位论文全文数据库信息科技辑》.2009,(第7期),73-104. |
无线传感器网络安全体系研究;张聚伟;《中国博士学位论文全文数据库信息科技辑》;20090731(第7期);73-104 * |
Also Published As
Publication number | Publication date |
---|---|
CN102255724A (en) | 2011-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Piao et al. | Polynomial-based key management for secure intra-group and inter-group communication | |
CN103888249B (en) | Cast communication proxy re-encryption method | |
CN108847928B (en) | Communication system and communication method for realizing information encryption and decryption transmission based on group type quantum key card | |
CN102255724B (en) | Hypergraph-model-based multicast key management method | |
CN101789945B (en) | Group key managing method based on Chinese remainder theorem | |
Li et al. | A key management scheme based on hypergraph for fog computing | |
Tian et al. | Accountable fine-grained blockchain rewriting in the permissionless setting | |
Kandi et al. | An efficient multi-group key management protocol for internet of things | |
CN113949541A (en) | DDS (direct digital synthesizer) secure communication middleware design method based on attribute strategy | |
CN105049449A (en) | Method for safety communication of nodes in cluster of wireless sensor network based on key technique | |
Hajyvahabzadeh et al. | A new group key management protocol using code for key calculation: CKC | |
JP4654371B2 (en) | Communication method and communication system using decentralized key management system | |
Sun et al. | Efficient key management for advanced distribution automation system | |
Aparna et al. | A key management scheme for secure group communication using binomial key trees | |
Günther et al. | Key management in distributed online social networks | |
Aparna et al. | Key management scheme for multiple simultaneous secure group communication | |
CN103957112A (en) | Security multicast communication method based on chaotic neural network | |
CN112765665A (en) | Data source management method and management platform | |
Hassan et al. | An efficient key management algorithm for hierarchical group communication | |
CN106230588A (en) | A kind of digital publishing rights key management method and system | |
CN112953940A (en) | Safe publishing and subscribing system and method based on hybrid encryption algorithm and key attribute filtering | |
Hajyvahabzadeh et al. | An efficient group key management protocol using code for key calculation: CKC | |
WO2023210557A1 (en) | Network control device | |
Tan et al. | Blockchain-Based Cross-domain Access Control Mechanism | |
Hassan et al. | Hi-kd: Hash-based hierarchical key distribution for group communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20140507 Termination date: 20180704 |
|
CF01 | Termination of patent right due to non-payment of annual fee |