Cyclic Key Update Scheme Based on Sharing Group for Distributed Secure Storage
QIAN Quan, WANG Tian-hong, HUANG Guo-rui, ZHANG Rui
1. School of Computer Engineering and Science, Shanghai University, Shanghai 200444, China;
2. Army Officer Acadedy of People’s Liberation Army, Hefei 230031, China
QIAN Quan, WANG Tian-hong, HUANG Guo-rui, ZHANG Rui. Cyclic Key Update Scheme Based on Sharing Group for Distributed Secure Storage[J]. Journal of Shanghai University(Natural Science Edition), doi: 10.3969/j.issn.1007-2861.2013.01.008.
[1] 韩德志. 分布式安全存储技术[J]. 计算机科学, 2007, 34(11): 81-83.[2] Alon N, Kaplan H, Krivelevich M, et al. Scalable secure storage when half the system is faulty [C]// Proceedings of the 27th International Colloquium onAutomata, Languages and Programming (ICALP’00). 2000: 576-587.[3] Kallahalla M, Riedel E, Swaminathan R, et al. Plutus: Scalable secure file sharing on untrusted storage [C]// Proceedings of the 2nd USENIX Conferenceon File and Storage Technologies (FAST’03). 2003: 29-42.[4] Cattaneo G, Catuogano L, Sorbo A D, et al. The design and implementation of a transparent cryptographic file system for UNIX [C]// Proceedings of theFREENIX Track: 2001 UNENIX Annual Technical Conference. USENIX: Association Berkeley, 2001: 199-212.[5] Wallner D, Harder E, Agee R. Key management for multicast: Issues and architectures (RFC2627) [J/OL]. [1999-01-23]. http://tools.ietf.org/html/rfc2627.[6] Wong C K, Gouda M, Lam S S. Secure group communications using key graphs [J]. IEEE/ACM Transaction on Networking, 2000, 8(1): 16-30.[7] Kocarev L, Tasev Z. Public-key encryption based on Chebyshev maps [C]// Proceedings of the 2003 International Symposium on Circuits and Systems (ISCAS’03).2003: 28-31.[8] 赵耿, 闫慧, 童宗科. 基于Chebyshev 多项式的公钥密码系统算法[J]. 计算机工程, 2008, 34(24): 137-139.