CN102255724B - Hypergraph-model-based multicast key management method - Google Patents

Hypergraph-model-based multicast key management method Download PDF

Info

Publication number
CN102255724B
CN102255724B CN201110185883.4A CN201110185883A CN102255724B CN 102255724 B CN102255724 B CN 102255724B CN 201110185883 A CN201110185883 A CN 201110185883A CN 102255724 B CN102255724 B CN 102255724B
Authority
CN
China
Prior art keywords
key
group
hypergraph
subgroup
super limit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110185883.4A
Other languages
Chinese (zh)
Other versions
CN102255724A (en
Inventor
周贤伟
丁颜
程志密
曾文璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology Beijing USTB
Original Assignee
University of Science and Technology Beijing USTB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology Beijing USTB filed Critical University of Science and Technology Beijing USTB
Priority to CN201110185883.4A priority Critical patent/CN102255724B/en
Publication of CN102255724A publication Critical patent/CN102255724A/en
Application granted granted Critical
Publication of CN102255724B publication Critical patent/CN102255724B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the field of security related application of key management in an information security technology, in particular to a centralized key management method, which comprises (1) an establishment stage, (2) the addition of a member to key hypergraph updating and (3) the quitting of the member from the key hypergraph updating. When the member is added, three key updating messages are required by a hypergraph-based key management scheme and are given by formulae shown in the description. In the scheme, a hypergraph theory is utilized to effectively reduce a key storage space of a key server, the key storage space of the group member and server encryption overhead in the addition of the group member, ensure the forward security and backward security of a security group and achieve high extensibility.

Description

A kind of key management method for multicast based on hypergraph model
Technical field
The present invention relates to the safety-relevant applications field of key management in information security technology, relate in particular to a kind of centralized key Managed Solution.
Background technology
Effectively multicast key management scheme is the basis of safe multicasting.Cast communication must guarantee that legal person can receive multicast packet, guarantees that illegal entity can not receive multicast packet simultaneously.Meanwhile, cast communication should provide the security services such as the confidentiality of authentication, integrity check and data.These security mechanisms rely on the encryption of one or more keys to realize conventionally.Managing these keys is challenging difficult problems, adds continually or exits especially group membership.
Researcher has proposed the multicast key management scheme of some at present, mainly be divided three classes: 1. centralized key Managed Solution (Centralized group key management protocols), as document [1] (C.K.Wang, S.Lam, Secure group communication using key graph, IEEE/ACMTransaction on networking, 8 (1), pp16-30, 2000.). 2. distributing key managing project (Decentralized group key management protocols), as document [2] (Mittra.S, Iolus:A framework for scalable secure multicasting, ACMSIGCOMM, 27 (4), PP.227-288). 3. distributed key management scheme (Distributed group keymanagement protocols).As document [3] (Boyd.C, On key agreement and conferencekey agreement, In proceedings of the information security and privacy:Australasian conference.Lecture notes in computer science, vol.1270.Springer-Verlag, New York, pp.294-302,1997).
The present invention proposes a kind of centralized key managing project that is suitable for.The present invention utilizes Hypergraph Theory to set up safe multicasting key management model.Hypergraph H=(V, E) comprises vertex set V={v 1, v 2..., v tand super limit set E={E 1, E 2..., E m, every super limit E ja nonvoid subset of V, and all super limit E junion be V.E jit is a finite aggregate and its radix k>=1.
In the present invention, member's cipher key relation can be regarded as a hypergraph H=(U, E), and U is member's set of a secure group, and a group membership regards a summit of hypergraph, E as i(K i) be group membership's subclass (super limit), have identical subgroup key (or group key) K i∈ K.
Summary of the invention
Main purpose of the present invention is to provide a kind of centralized multicast key management scheme, and key server is responsible for generation, distribution, renewal of key etc.
Technical scheme of the present invention is as follows:
Suppose that the current whole network system is that safe and all members and key server are trusty.In the cipher key management procedures of carrying out, key server plays a part very important.
In order to simplify agreement below, use following symbol:
In agreement below, need to use following symbol: 1) if it is the member of that x → y:z represents 1. y, the transmission message z from x to y; If 2. y is that member gathers, the transmission of message z is exactly the each member in from x to y; 2) { m} krepresent with key k encrypting messages m; 3) if A, B is two set, A - B = A∩ B ‾ .
Based on a key managing project for hypergraph, comprising:
(1) establishment stage
Be provided with the believable group of GC of control centre of a responsible group access control and key management, and this GC is group membership's distributed key and maintains the relation between member's key.First, GC sets up key hypergraph.The member of secure group is corresponding to the summit of key hypergraph, super limit E i(K i) representing member's set, and these member's shared Sub group keys K i.A given key hypergraph H, super limit set (safe subgroup) intersects at summit GC between two.Key K of selection that GC is random 0, as the master key of secure group, and master key is distributed to all members safely.Group membership is certified and join in secure group, and each member and GC share a key u i, be called member's individual key.
2) member adds key hypergraph to upgrade
Suppose that member u sends and joins request to GC.The permission if joined request, GC is the individual key k to member u by safe channel distribution u.After this member adds secure group, a new secure group has just formed.GC must upgrade group key by the channel of safety, subgroup key carrys out more new key hypergraph, and member u joins in a subgroup and in this subgroup and adds summit u.
Agreeing to that u adds subgroup E i(K i) after, GC is new key hypergraph more.GC adds u-summit to super limit E i(K i), and by individual key k ube distributed to safely u, in order to realize backward fail safe, the group key K of hypergraph 0with super limit E i(K i) subgroup key K imust upgrade.Super limit comprises the super limit that adds member u, is referred to as to add excess of imports limit.
For backward fail safe, the group key and the subgroup key that add excess of imports limit must upgrade.GC generates at random new group key, adds after the subgroup key on excess of imports limit, and GC needs safely to legal group membership's distributed key updating message.
Key updating message is constructed in the following way.For member u, join a safe subgroup E i(K i), add excess of imports limit E i(K i) subgroup key K imust upgrade group key K 0must upgrade and be sent to safely all legal group memberships.In addition the lastest imformation of key,
Figure BDA0000073500060000031
send to and add member u.
When a member adds fashionablely, based on the key managing project of hypergraph, need three key updating message, by lower formula, provided:
1 ) GC → { U - E i ( K i ) } : { K 0 ′ } K 0
2 ) GC → { E i ( K i ) } : { K 0 ′ , K i ′ } K i
3 ) GC → { u } : { K 0 ′ , K i ′ } k u
For a member, join a key hypergraph, IKMP is:
1) u → GC: join super limit E i(K i) request;
2) GC → u: certified member u, the generation individual key k that GC is random uand distributed key k safely ugive member u;
3) GC: new key K is organized in random generation 0' and subgroup key K i' and carry out following steps;
4 ) GC → { U - E i ( K i ) } : { K 0 ′ } K 0
5 ) GC → { E i ( K i ) } : { K 0 ′ , K i ′ } K i
6 ) GC → { u } : { K 0 ′ , K i ′ } k u
(3) member exits the renewal of key hypergraph
Agree to the request of leaving of a member u, GC leaves by deleting u summit the super limit E that comprises member u i(K i) carry out more new key hypergraph.For forward security, group key and the subgroup key that leaves super limit need renewal, comprise the super limit of leaving member u and be called and leave super limit, GC and key updating message safety be distributed to corresponding group membership.
For the super limit E of leaving of member u i(K i), for forward security, leave the subgroup key K on super limit ineed to upgrade, simultaneously group key K 0also need to upgrade.For leaving super limit E 3(K 3), the each member who leaves in super limit, must upgrade two keys, i.e. a subgroup key K iwith a group key K 0.GC is by encrypting new key K with suitable key-encrypting key 0' and K i'.As for other the super limit except leaving super limit, GC is by carrying out encrypted set key K with their subgroup key 0' build key updating message.These key updating message are multicasted to corresponding subgroup subsequently respectively.
The key hypergraph of key updating protocol leave to(for) a member u is represented by step below:
1) u → GC: super limit E is left in request i(K i)
2) GC → u: agree to leave;
3) GC: generate at random new group key K 0' and leave the subgroup key K on super limit i';
4) for the super limit E of key hypergraph j, j ≠ i,
Figure BDA0000073500060000041
5) for leaving super limit E i(K i) each member u j, have u j≠ u,
Figure BDA0000073500060000042
If n=m × l, wherein n is the group membership's of secure group number.L is an integer and n is divided into l subgroup.This process need (l-1)+(m-1)=l+m-2 bar key updating message.The encryption overhead of GC is (l-1)+(m-1)=l+m-2, and wherein (l-1) expression (l-1) individual subgroup need to be upgraded their subgroup key; (m-1) represent (m-1) individual subgroup Ei member, need to utilize independently their individual key to upgrade their group key and subgroup key.
Beneficial effect of the present invention is as follows:
By n=m × l, l + m ≥ lm = n , Now l = m = n . So, when l = m = n , The number of keys of key server storage is
Figure BDA0000073500060000047
wherein n individual key,
Figure BDA0000073500060000048
individual subgroup key and 1 group key.Document [1] (C.K.Wang, S.Lam, Secure group communication using keygraph, IEEE/ACM Transaction on networking, 8 (1), pp16-30,2000.) in scheme, the key of key server storage is [d/ (d-1)] × n, the degree that wherein d is key tree.The number of keys that each group membership need to store is 3, i.e. 1 group key, 1 subgroup key and one by one body key.Scheme in document [1], the number of keys that each group membership need to store is log d n+ 1.When a member adds key hypergraph, the encryption overhead of key server is 3, sees that member adds key updating part.Scheme in document [1], when a member adds key tree, the encryption overhead of key server is 2log d n-1.When a member exits key hypergraph, the encryption overhead of key server is
Figure BDA0000073500060000049
labor is shown in that member exits key updating part.Scheme in document [1], when a member exits key tree, the encryption overhead of key server is (d+2) (1og 2 n-1)/2.
So, the present invention and document [1] (C.K.Wang, S.Lam, Secure group communicationusing key graph, IEEE/ACM Transaction on networking, 8 (1), pp16-30,2000.) key tree is compared, and has reduced significantly the key storage expense of key server, (as when document [1] and the ratio of the key managing project storage overhead based on hypergraph model of our suggestion being
Figure BDA00000735000600000410
so the storage overhead of the key server of the key managing project based on hypergraph model is few); The storage overhead that has reduced group membership (is (log as worked as document [1] with the ratio of the key managing project storage overhead based on hypergraph model of our suggestion d n+ 1): 3, as n → ∞, ratio trends towards infinity, so member's key storage expense of the key managing project based on hypergraph model is few) and reduced the encryption overhead that member adds fashionable key server (as the key managing project based on hypergraph model when document [1] and our suggestion when the ratio that a member adds the encryption overhead of fashionable key server be (2log d n-1): 3, as n → ∞, ratio trends towards infinity, so that the member of the key managing project based on hypergraph model adds fashionable encryption overhead is few).
This scheme is utilized Hypergraph Theory, has effectively reduced the key storage space of key server, group membership's key storage space and group membership adds fashionable server for encrypting expense, has guaranteed safe group's forward and backward fail safe, is with good expansibility.The weak point of this scheme: cipher key service center is perfectly safe.
Accompanying drawing explanation
Fig. 1 is member u 10add the variation of rear key hypergraph.
Fig. 2 is member u 9the variation of the key hypergraph before and after leaving.
Embodiment
Below in conjunction with example, the present invention is described further.
(1) establishment stage
Be provided with the believable group of GC of control centre of a responsible group access control and key management, and this GC is group membership's distributed key and maintains the relation between member's key.First, GC sets up key hypergraph.The member of secure group has GC, u 1, u 2, u 3, u 4, u 5, u 6, u 7, u 8, u 9correspond respectively to the summit of key hypergraph, super limit E 1(K 1)={ u 1, u 2, u 3, u 4, E 2(K 2)={ u 5, u 6, E 3(K 3)={ u 7, u 8, u 9representing group membership's set, and these members shared Sub group key K respectively 1, K 2, K 3.A given key hypergraph H, super limit set (safe subgroup) intersects at summit GC between two.Key K of selection that GC is random 0, as the master key of secure group, and all being distributed to of master key safety members.Group membership is certified and enter into secure group, and each member and GC share a key k i, (i=1,2 ..., 9), be called member's individual key.
(1) member adds key hypergraph to upgrade
As shown in Figure 1, suppose member u 10be agreed and join safe subgroup E 3(K 3).This adds excess of imports limit is E 3(K 3).Subgroup key is from K 3change to K 3', group key is from K 0change to K 0'.Member u 1, u 2, u 3, u 4, u 5, u 6need to upgrade group key K 0for K 0', member u 7, u 8, u 9and u 10need to upgrade respectively group key and subgroup key K 0, K 3for K 0', K 3'.
As shown in Figure 1, to member u 10join secure group, GC need to send key updating information below.
1 ) GC → { u 1 , u 2 , u 3 , u 4 , u 5 , u 6 } : { K 0 ′ } K 0
2 ) GC → { u 7 , u 8 , u 9 } : { K 0 ′ , K 3 ′ } K 3
3 ) GC → { u 10 } : { K 0 ′ , K 3 ′ } k 10
(2) member leaves the renewal of key hypergraph
As shown in Figure 2, suppose member u 9agree to leave secure group.In key hypergraph, leaving super limit is E 3(K 3).For forward security, group key is from K 0be updated to K 0', leave super limit E 3(K 3) subgroup key from K 3be updated to K 3'.Member u 1, u 2, u 3, u 4, u 5, u 6only need to upgrade group key from K 0to K 0', leave the member u on super limit 7and u 8need to upgrade respectively group key and subgroup key from K 0, K 3for K 0', K 3'.
After a member leaves, for distributed key updating message is safely given corresponding member.As shown in Figure 2, for member u 9leave key hypergraph, GC need to send following key updating message:
1 ) GC → { u 1 , u 2 , u 3 , u 4 } : { K 0 ′ } K 1
2 ) GC → { u 5 , u 6 } : { K 0 ′ } K 2
3 ) GC → { u 7 } : { K 0 ′ , K 3 ′ } k 7
4 ) GC → { u 8 } : { K 0 ′ , K 3 ′ } k 8

Claims (1)

1. the key management method for multicast based on hypergraph model, is characterized in that, described method is as follows:
Suppose that the current whole network system is that safe and all members and key server are trusty;
In agreement below, need to use following symbol: 1) if x → y:z represents that 1. y is a member, the transmission message z from x to y; If 2. y is that member gathers, the transmission of message z is exactly the each member in from x to y; 2) { m} krepresent with key k encrypting messages m; 3) if A, B is two set, A - B = A ∩ B ‾ ;
This method comprises:
(1) establishment stage:
Be provided with the believable group of GC of control centre of a responsible group access control and key management, and this GC is group membership's distributed key and maintains the relation between member's key; First, GC sets up key hypergraph; The member of secure group is corresponding to the summit of key hypergraph, super limit E i(K i) representing member's set, and these member's shared Sub group keys K i; A given key hypergraph H, super limit aggregation security subgroup intersects at summit GC between two; GC selects the master key K of secure group randomly 0, and master key is distributed to all members safely; Group membership is certified and join in secure group, and each member and GC share a key u i, be called member's individual key;
(2) member adds key hypergraph to upgrade
Suppose that member u sends and joins request to GC; The permission if joined request, GC sends individual key k by safe channel u; After member u adds secure group, a new secure group has just formed; GC must upgrade group key by the channel of safety, subgroup key carrys out more new key hypergraph, and member u joins in a subgroup and in this subgroup and adds summit u; Agreeing to that u adds subgroup E i(K i) after, GC is new key hypergraph more; GC adds u-summit to super limit E i(K i), and by individual key k ube distributed to safely u, in order to realize backward fail safe, the group key K of hypergraph 0with super limit E i(K i) subgroup key K ineed to upgrade; In the present invention, in super limit, comprise the super limit that adds member u, be referred to as to add excess of imports limit;
For a member, join key hypergraph, IKMP is as follows:
1) u → GC: join super limit E i(K i) request;
2) GC → u: certified member u, the generation individual key k that GC is random uand distributed key k safely ugive member u;
3) GC: produce at random new group key K 0' and subgroup key K i' and carry out following steps;
4 ) GC → { U - E i ( K i ) } : { K 0 ′ } K 0
5 ) GC → { E i ( K i ) } : { K 0 ′ , K i ′ } K i
6)GC→{u}:{K 0',K i'} k
(3) member exits the renewal of key hypergraph
Agree to the request of leaving of a member u, GC comprises the super limit E that leaves member u by deletion i(K i) the summit u of u carrys out more new key hypergraph; Comprise the super limit of leaving member u and be called and leave super limit, simultaneously GC by key updating message safety be distributed to corresponding group membership;
For the super limit E of leaving of member u i(K i), for forward security, leave the subgroup key K on super limit ineed to upgrade, simultaneously group key K 0also need to upgrade; For leaving super limit E i(K i), the each member who leaves in super limit, must upgrade two keys, i.e. a subgroup key K iwith a group key K 0; GC is by encrypting new key K with suitable key-encrypting key 0' and K i'; As for other the super limit except leaving super limit, GC is by carrying out encrypted set key K with their subgroup key 0' build key updating message; These key updating message are multicasted to corresponding subgroup subsequently respectively;
The key hypergraph of key updating protocol leave to(for) a member u is represented by step below:
1) u → GC: super limit E is left in request i(K i)
2) GC → u: agree to leave;
3) GC: generate at random new group key K 0' and leave the subgroup key K on super limit i';
4) for the super limit E of key hypergraph j, j ≠ i,
Figure FDA0000430654620000021
5) for leaving super limit E i(K i) each member u j, have u j≠ u,
Figure FDA0000430654620000022
if n=m × s, wherein n is the group membership's of secure group number; S is an integer and n is divided into s subgroup; This process need (s-1)+(m-1)=s+m-2 bar key updating message; The encryption overhead of GC is (s-1)+(m-1)=s+m-2, and wherein (s-1) expression (s-1) individual subgroup need to be upgraded their subgroup key; (m-1) represent (m-1) individual subgroup E imember, need to utilize their individual key to upgrade their group key and subgroup key independently.
CN201110185883.4A 2011-07-04 2011-07-04 Hypergraph-model-based multicast key management method Expired - Fee Related CN102255724B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110185883.4A CN102255724B (en) 2011-07-04 2011-07-04 Hypergraph-model-based multicast key management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110185883.4A CN102255724B (en) 2011-07-04 2011-07-04 Hypergraph-model-based multicast key management method

Publications (2)

Publication Number Publication Date
CN102255724A CN102255724A (en) 2011-11-23
CN102255724B true CN102255724B (en) 2014-05-07

Family

ID=44982731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110185883.4A Expired - Fee Related CN102255724B (en) 2011-07-04 2011-07-04 Hypergraph-model-based multicast key management method

Country Status (1)

Country Link
CN (1) CN102255724B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103970860B (en) * 2014-05-07 2017-05-24 华为技术有限公司 Method, device and system for processing data
CN106169996B (en) * 2016-07-04 2019-04-09 中国人民武装警察部队工程大学 Multi-area optical network key management method based on key hypergraph and identification cipher
CN106953727B (en) * 2017-03-13 2019-09-10 南京邮电大学 Group safety certifying method based on no certificate in D2D communication

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
C.K.Wang等.Secure group communication using key graph.《IEEE/ACM Transaction on networking》.2000,16-30.
Secure group communication using key graph;C.K.Wang等;《IEEE/ACM Transaction on networking》;20000229;16-30 *
张聚伟.无线传感器网络安全体系研究.《中国博士学位论文全文数据库信息科技辑》.2009,(第7期),73-104.
无线传感器网络安全体系研究;张聚伟;《中国博士学位论文全文数据库信息科技辑》;20090731(第7期);73-104 *

Also Published As

Publication number Publication date
CN102255724A (en) 2011-11-23

Similar Documents

Publication Publication Date Title
Piao et al. Polynomial-based key management for secure intra-group and inter-group communication
CN103888249B (en) Cast communication proxy re-encryption method
CN108847928B (en) Communication system and communication method for realizing information encryption and decryption transmission based on group type quantum key card
CN102255724B (en) Hypergraph-model-based multicast key management method
CN101789945B (en) Group key managing method based on Chinese remainder theorem
Li et al. A key management scheme based on hypergraph for fog computing
Tian et al. Accountable fine-grained blockchain rewriting in the permissionless setting
Kandi et al. An efficient multi-group key management protocol for internet of things
CN113949541A (en) DDS (direct digital synthesizer) secure communication middleware design method based on attribute strategy
CN105049449A (en) Method for safety communication of nodes in cluster of wireless sensor network based on key technique
Hajyvahabzadeh et al. A new group key management protocol using code for key calculation: CKC
JP4654371B2 (en) Communication method and communication system using decentralized key management system
Sun et al. Efficient key management for advanced distribution automation system
Aparna et al. A key management scheme for secure group communication using binomial key trees
Günther et al. Key management in distributed online social networks
Aparna et al. Key management scheme for multiple simultaneous secure group communication
CN103957112A (en) Security multicast communication method based on chaotic neural network
CN112765665A (en) Data source management method and management platform
Hassan et al. An efficient key management algorithm for hierarchical group communication
CN106230588A (en) A kind of digital publishing rights key management method and system
CN112953940A (en) Safe publishing and subscribing system and method based on hybrid encryption algorithm and key attribute filtering
Hajyvahabzadeh et al. An efficient group key management protocol using code for key calculation: CKC
WO2023210557A1 (en) Network control device
Tan et al. Blockchain-Based Cross-domain Access Control Mechanism
Hassan et al. Hi-kd: Hash-based hierarchical key distribution for group communication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140507

Termination date: 20180704

CF01 Termination of patent right due to non-payment of annual fee