期刊文献+

自组织网络中基于ID加密的自启动分布式CA 被引量:1

Distributed CA of ID Based Encrypt in Ad hoc
下载PDF
导出
摘要 本文针对自组织网络无中心、易受攻击等特点提出了一种基于ID加密的自启动分布式CA模型 ,讨论了自组织网络中基于ID加密的自启动分布式CA的形成 ,密钥更新 ,对入网节点的阈值签名 ,以及入网节点自身分钥 /私钥对的产生过程。 Because the Ad hoc has no center,and is realiable to be attacked,this article puts forward a kind of distributed ID based encrypt CA model which is initialized by itsef,and discusses the formation of distributed CA,the key refreshion of CA sub-node,the threshold signature to new member,and the generation of public/private key pair of the new member.
出处 《计算机与数字工程》 2005年第1期5-8,20,共5页 Computer & Digital Engineering
基金 国家自然科学基金重大研究计划 (No .90 10 4 0 2 9)资助项目
关键词 自组织网络 认证中心 基于身份的加密 阈值签名 Adhoc,CA,identity-based encryption,threshold signature
  • 相关文献

参考文献12

  • 1刘波,李之棠.Ad hoc网络中密钥分发机制的研究[J].华中科技大学学报(自然科学版),2003,31(S1):244-246. 被引量:4
  • 2Steven D. Galbraith. Supersingular curves in cryptography. [ EB/OL] http://eprint. iacr. org,2002.
  • 3jiejun Kong, Petros Zerfos, Haiyun Luo, Sorgwu Lu, Lixia Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad - Hoc Networks, IEEE Symposium on Computers and Communications,July 2002.
  • 4P. GEMMEL. An introduction to threshold crytography. In CyrptoBytes, a technical newsletter of RSA Laboratories, Vol. 2, No. 7,1997.
  • 5Zhou D L, Haas Z. Securing Ad hoc networks. IEEE Network Magazine, 1999,13 (6) : 102-05.
  • 6Pedersen T. A threshold cryptosystem without a trusted party[A]. In EUROCRYPT' 91 [C]. Springer2Verlag,Berlin:1991:522-626.
  • 7D. Boneh and M. Franklin. Identity - Based Encryption from the Weil Pairing. In J. Killian, editor, Advances in Cryptoloty, CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 213 - 229. Springer Verlag, August 2001.
  • 8Aram Khalili, Jonathan Kata, William A. Arbaugh. IEEE Workshop on Security and Assurance in Ad - Hoc Networks 2003.
  • 9SHAM IR A. How to share a secret[J ]. Commun ACM, 1979,22(11) :61226131.
  • 10Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, pp. 251 - 260, IEEE Ninth International Conference on Network Protocols(ICNP'01) ,2001.

二级参考文献4

  • 1Zhou D L,Haas Z.Securing Ad hoc networks[].IEEE Network Magazine.1999
  • 2Gennaro R,Jarecki S,Krawczyk H.Secure distributed Key generation for discrete-log based cryp-tosystems[].Advances in Cryptology Eurocrypt.1999
  • 3Burrows M,Abadi M,Needham R.A logic of authentication[].ACM Transactions on Computer Systems(TOCS).1990
  • 4BonehD,FranklinM.Identity basedencryptionfromtheweilpairing[].AdvancesinCryp tology.2001

共引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部