期刊文献+

泛在电力物联网的多项式密钥管理算法研究 被引量:1

Research on polynomial keymanagement algorithm ubiquitous in power Internet of Things
下载PDF
导出
摘要 随着泛在电力物联网(UPIOT)的快速发展,其传感器网络出现的安全问题也广受关注。本文针对在国家电网、安全监控等关键领域中密钥管理技术进行了研究。虽然RSA和椭圆曲线等公钥加密方案能够提供足够的安全性,但由于计算量大,与传感器节点的资源约束相冲突,使得它们的使用受到了限制。对于集群密钥的安全管理方面,本文将双变量多项式的概念引入密钥管理。这不仅仅确保了任意两个节点之间的成对密钥,还对生成的双变量多项式进行簇间密钥分配,对生成的双变量多项式在密钥管理中的各种特性进行测试,并在多项式的不同阶数下进行了仿真实验及结果分析。 With the rapid development of the ubiquitous Power Internet of Things(UPIOT),the security problems of its sensor networks are also widely concerned.Traditional sensor networks are composed of hundreds of self-organizing sensor nodes.Key management is one of the most important security primitives in state grid,security monitoring and so on.Although public key encryption schemes such as RSA and elliptic curve can provide sufficient security,their use is limited due to the large amount of computation and the conflict with the resource constraints of sensor nodes.For the security management of cluster keys,this paper introduces the concept of bivariate polynomial into key management.This not only ensures the pair key between any two nodes,also for key distribution between the clusters of the bivariate polynomial,and finally to generate various features in the key management of bivariate polynomial test.Under different order polynomial,the simulation experiment and the simulation results are analyzed.
作者 陈虹旭 李晓坤 徐龙 董潍赫 刘清源 付文香 CHEN Hongxu;LI Xiaokun;XU Long;DONG Weihe;LIU Qingyuan;FU Wenxiang(Postdoctoral Program of Heilongjiang Hengxun Technology Co.,Ltd.,Harbin 150090,China;Heilongjiang University,Harbin 150090,China)
出处 《智能计算机与应用》 2020年第8期140-143,共4页 Intelligent Computer and Applications
基金 国家自然科学基金(81273649,61501132,61672181) 中央高校基本科研业务费专项资金(3072019CFT0603) 中国博士后科学基金(2019M650069) 中小企业创新基金(2017FF1GJ023) 专利优势示范企业基金(2017YBQCZ029) 黑龙江省自然科学联合引导基金(LH2019F049,LH2019A029) 黑龙江省基础科研科技创新基金(KJCX201805) 黑龙江省基础科研青年创新团队基金(RCYJTD201805)
关键词 泛在电力物联网 传感器网络 多项式密钥 密钥管理 ubiquitous in the Internet of Things sensor network polynomial key key management
  • 相关文献

参考文献2

二级参考文献20

  • 1郭奋卓,温巧燕.量子密钥分发中的验证方案[J].北京邮电大学学报,2003,26(z1):54-56. 被引量:3
  • 2Wiesner S.Conjugate coding[J].SIGACT News,1983,15:78-88.
  • 3Bennett C H,Brassard G,Breidbart S,et al.Quantum cryptography,or unforgeable subway tokens[A].Advances in Cryptography:Proceedings of CRYPTO 82[C].New York:Plenum Press,1983.267-275.
  • 4Bennett C H,Brassard G.Quantum cryptography and its application to provably secure key expansion,public-key distribution,and coin-tossing[A].IEEE International Symposium on Information Theory[C].St-Jovite:Qebec Press,1983.91-95.
  • 5Bennett C H,Brassard G.Quantum cryptography:public-key distribution and coin tossing[A].Proceedings of the International Conference on Computers,Systems and Signal Processing[C].India:Bangalore Press,1984.175-179.
  • 6Ekert A K.Quantum cryptography based on Bell's theorem[J].Phys Rev Lett,1991,67:661-663.
  • 7Bennett C H.Quantum cryptography using any two nonorthogonal states [J].Phys Rev Lett,1992,68:3 121-3 124.
  • 8Dusek M,Haderka O,Hendrych M,et al.Quantum identification system[J].Phys Rev A,1999,60:149-156.
  • 9Zeng G,Zhang W.Identity verification in quantum key distribution[J].Phys Rev A,2000,61:022303.
  • 10Liunggren D,Bourennane M,Karlsson A.Authority-based user authentication in quantum key distribution[J].Phys Rev A,2000,62:022305.

共引文献25

同被引文献16

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部