Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Shanghai Jiaotong University》 2014-10
Add to Favorite Get Latest Update

A Group Key Agreement Scheme for QKD Networks

SU Jin-hai;LUAN Xin;GUO Yi-xi;ZHAO Hong-tao;Department of Information Security,PLA Information Engineering University;  
In QKD(quantum key distribution)networks,in order to serve the multicast communications among multiple users better,based on the special application background of quantum key generation in pairs,agroup key agreement model was built and a group key agreement scheme based on clustering structure and binary code was presented.This scheme consumes a small amount of end-to-end quantum keys,and then obtains a consistent set of keys via security consultation.When new members join or old members leave,the key update is fast and easy.Analysis shows that the scheme has good security.
【CateGory Index】: TN918.4
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 3 Hits
1 Yang Jun ①② Zhou Xian-wei ② ① (College of Computer Science and Technology,Southwest University for Nationalities,Chengdu 610041,China) ② (School of Information Engineering,University of Science and Technology Beijing,Beijing 100083,China);A Two-level Decentralized Group Key Management Scheme Based on the Discrete Logarithm Problem[J];Journal of Electronics & Information Technology;2008-06
2 LIU Gui,JIANG Tian-wei,YU Song,GU Wan-yi(State Key Laboratory of Information Photonics and Optical Communications (Beijing University of Posts and Telecommunications),Beijing 100876,China);The research of european quantum confidential communications network[J];Optical Communication Technology;2011-12
3 JIANG Xiao-gang~1,ZHOU Xian-wei~2,ZHENG Lian-cun~2,YANG Jun~3(1.Information Engineering School,University of Science and Technology Beijing,Beijing 100083,China;2.Applied Science School,University of Science and Technology Beijing,Beijing 100083,China;3.Civil and Environmental Engineering School,University of Science and Technology,Beijing 100083,China);Design and Implementation of TGDH Protocol[J];Computing Technology and Automation;2005-03
Chinese Journal Full-text Database 3 Hits
1 Wang Bao-cang①② Wei Yong-zhuang③ Hu Yu-pu① ①(Key Lab of Computer Networks & Information Security,Ministry of Education,Xidian University,Xi'an 710071,China) ②(State Key Lab of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100049,China) ③(School of Information and Communication,Guilin University of Electronic Technology,Guilin 541004,China);Public Key Cryptosystem Using Random Knapsacks[J];Journal of Electronics & Information Technology;2010-07
2 DU Xiaoqiang1,2, BAO Wansu1 1.Institute of Electronic Technology, the PLA Information Engineering University, Zhengzhou 450004, China 2.Unit 95019 of PLA, China;Multicast key management scheme based on relationship of administrative subordination[J];Computer Engineering and Applications;2013-01
3 LI Ying-tao;MA Chun-guang;LI Zeng-peng;School of National secrecy,Harbin Engineering University;;Research of Key Technologies on Classified Information System's Interconnection[J];Netinfo Security;2013-08
【Secondary Citations】
Chinese Journal Full-text Database 3 Hits
1 YANG Jun ZHOU Xian-Wei QIN Bo-Ping (School of Information Engineering,Beijing University of Science and Technology,Beijing 100083);Cryptographic Analysis of a Group Key Management Scheme Based on a Public-key Encryption Algorithm[J];Computer Science;2006-07
2 QU Jin1+, GE Jian-Hua1, JIANG Ming2 1(National Key Laboratory of ISN, Xidian University, Xi抋n 710071, China) 2(School of Electronics & Information and Electric Power Engineering, Shanghai Jiaotong University, Shanghai 200030, China);Key Management for Secure Multicast Using Huffman Hierarchy[J];Journal of Software;2003-01
3 TAN Zuo-Wen1,2+, LIU Zhuo-Jun1,2, XIAO Hong-Guang3 1(Institute of Systems Science, AMSS, The Chinese Academy of Sciences, Beijing 100080, China) 2(State Key Laboratory of Information Security (Graduate School, The Chinese Academy of Sciences), Beijing 100049, China) 3(The College of Electronics Information Engineering, Changsha University of Science & Technology, Changsha 410076, China);A Fully Public Key Tracing and Revocation Scheme Provably Secure Against Adaptive Adversary[J];Journal of Software;2005-07
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved