DocumentCode
1984404
Title
Group Security Communication Strategy with Non-Trusted Authority
Author
Wang, Li ; Wang, Tian Qin
Author_Institution
Dept. of Comput. & Inf. Eng., He Nan Univ., Kaifeng, China
fYear
2010
fDate
20-22 Aug. 2010
Firstpage
1
Lastpage
3
Abstract
This paper proposes a strategy on group security communication with non-Trusted Authority, based on Shamir threshold secret-shared cryptosystem and pairs of generators. In this strategy, the keys of nodes and group are co-produced by all the nodes within the group after consulting together. Once the keys have been produced, their validity can be authenticated by each of them, which can be used in detecting the malicious nodes effectively. The periodic update of the node keys and group key has been described as well in this paper. Above all, the passive and active attack can be resisted; the network could run in a safer condition because of the strategy.
Keywords
computer network security; public key cryptography; Shamir threshold secret shared cryptosystem; group key; group security communication strategy; malicious node; node key; nontrusted authority; Authentication; Bandwidth; Privacy; Public key; Routing;
fLanguage
English
Publisher
ieee
Conference_Titel
Internet Technology and Applications, 2010 International Conference on
Conference_Location
Wuhan
Print_ISBN
978-1-4244-5142-5
Electronic_ISBN
978-1-4244-5143-2
Type
conf
DOI
10.1109/ITAPP.2010.5566612
Filename
5566612
Link To Document