Title :
Group Security Communication Strategy with Non-Trusted Authority
Author :
Wang, Li ; Wang, Tian Qin
Author_Institution :
Dept. of Comput. & Inf. Eng., He Nan Univ., Kaifeng, China
Abstract :
This paper proposes a strategy on group security communication with non-Trusted Authority, based on Shamir threshold secret-shared cryptosystem and pairs of generators. In this strategy, the keys of nodes and group are co-produced by all the nodes within the group after consulting together. Once the keys have been produced, their validity can be authenticated by each of them, which can be used in detecting the malicious nodes effectively. The periodic update of the node keys and group key has been described as well in this paper. Above all, the passive and active attack can be resisted; the network could run in a safer condition because of the strategy.
Keywords :
computer network security; public key cryptography; Shamir threshold secret shared cryptosystem; group key; group security communication strategy; malicious node; node key; nontrusted authority; Authentication; Bandwidth; Privacy; Public key; Routing;
Conference_Titel :
Internet Technology and Applications, 2010 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5142-5
Electronic_ISBN :
978-1-4244-5143-2
DOI :
10.1109/ITAPP.2010.5566612