• DocumentCode
    1984404
  • Title

    Group Security Communication Strategy with Non-Trusted Authority

  • Author

    Wang, Li ; Wang, Tian Qin

  • Author_Institution
    Dept. of Comput. & Inf. Eng., He Nan Univ., Kaifeng, China
  • fYear
    2010
  • fDate
    20-22 Aug. 2010
  • Firstpage
    1
  • Lastpage
    3
  • Abstract
    This paper proposes a strategy on group security communication with non-Trusted Authority, based on Shamir threshold secret-shared cryptosystem and pairs of generators. In this strategy, the keys of nodes and group are co-produced by all the nodes within the group after consulting together. Once the keys have been produced, their validity can be authenticated by each of them, which can be used in detecting the malicious nodes effectively. The periodic update of the node keys and group key has been described as well in this paper. Above all, the passive and active attack can be resisted; the network could run in a safer condition because of the strategy.
  • Keywords
    computer network security; public key cryptography; Shamir threshold secret shared cryptosystem; group key; group security communication strategy; malicious node; node key; nontrusted authority; Authentication; Bandwidth; Privacy; Public key; Routing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Technology and Applications, 2010 International Conference on
  • Conference_Location
    Wuhan
  • Print_ISBN
    978-1-4244-5142-5
  • Electronic_ISBN
    978-1-4244-5143-2
  • Type

    conf

  • DOI
    10.1109/ITAPP.2010.5566612
  • Filename
    5566612