Group key management access based on linear Geomnetrie

Jintai Ding,Yujun Liang,Shaohua Tang,Guangdong Yang
2009-01-01
Abstract:There is disclosed a group key management access based on linear geometry. The access comprises the following steps: Step 1: a group controller selects a mapping f and a finite field F out; each group member selects an m-dimensional private vector over the finite field F, and sends it over a secure channel to the group controller; Step 2: the group controller selects a mapping parameter in the finite field F randomly and forms the private vectors of all group members using the mapping f in accordance with the imaging parameters on a new set of vectors from; Step 3: the group controller selects a random number k in the finite field F as a group key, and constructed using the new set of vectors and the group key, a linear system of equations; the group controller calculates the central vector and sends the central vector and the imaging parameters via an open channel to all group members; Step 4: after the group members have received the central vector and the imaging parameters, the private vector is ready to each group member in accordance with the imaging parameters on a new vector in a vector space, wherein the group key by calculating the inner product of the new vector and the central vector is obtained. The invention requires a small memory and less calculation, has the property of high security and is effective against crowbar attack.
What problem does this paper attempt to address?