期刊文献+

具有空间、时间双重分布性的随机会话密钥分发系统 被引量:1

A Distributed Random Key Distribution System with Distributed Characteristics of Space and Time
下载PDF
导出
摘要 本文首先提出了分布式密码协议的空间分布性和时间分布性的观点 ,并从双重分布性的角度研究分布式密码协议 .作为一个例子 ,在V Daza的密钥分发系统中一个只具有空间分布性的分布式密钥分发系统的基础上 ,引入了前置安全 (proactivesecurity)体制 ,得到了一个具有空间和时间双重分布性 ,可以抵抗动态攻击者的分布式密钥分发协议 .拓展了分布式密码协议的研究空间 .同时 ,文中在建立概率空间的基础上 ,证明了分布式密钥分发系统的安全性 . This paper first gives the notion about distributed cryptographic protocol with distributed characteristics of space and time.Then research distributed cryptographic protocol based on the notion.For an instance,we use proactive security in an distributed key distribution system only with distributed characteristic of space and give a distributed protocol against mobile adversary.This paper enlarges research field of distributed cryptographic protocol.At last,this paper proves the security of distributed random key distribution protocol based on the probability space.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第1期96-100,共5页 Acta Electronica Sinica
基金 国家973项目(No.G1999035804) 国家自然科学基金(No.90204015 19931010) 河南省杰出青年基金(No.0212001400)
关键词 分布式密码 秘密共享 随机会话密钥 动态攻击者 概率空间 distributed cryptographic sharing secret random session key mobile adversary probability space
  • 相关文献

参考文献15

  • 1Paz Morillo ect. Some Trends for Future Research in Distributed Cryptogtaphy [DB/OL]. hap://www-mat.upc.es/grup_ de_ cripto/.
  • 2R Ostrovsky,M Yung. How to withstand mobile tints attacks[J] .ACM Symposium on Principles of Distributed Computing, 1991.51 - 59.
  • 3T Rabin, M Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority[A]. Proc 21st Annual Sympo. On the Theory of Computing[ C ]. ACM, 1989.73 - 85.
  • 4A Herzberg, S Jarecki, H Krawczyk, M Yung. Proactive secret sharing or:how to copy with perpetual leakage[A]. Crypto'95[C]. 1995,339- 352.
  • 5Y Frankel, P Gemmel, P D MacKenzie, M Yung. Proactive RSA [A].Crypto'97[ C]. LNCS 1294.440-452.
  • 6T Rabin. A simplified approach to threshold and proaetive RSA [A].Crypto'98[ C]. LNCS 1462,1998.89 - 104.
  • 7D R Stinson, R Wei. Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures [DB/OL]. http://citeseer.nj.nec.com/198663.html( 1999).
  • 8Vanesa Daza, Javier Herranz, Caries Padro, German Saez. A Distribute and Computationally Secure Key Distribution Scheme[DB/OL].http://citeseer.nj.nec.com/daza02distributed.html(2002).
  • 9M Naor, B Pinkas, O Reingold. Distributed pseudo-radon functions and KDCs[A]. Advances in Cryptology. Eurocrypt'99[C]. LNCS 1592,Springer-Verlag, 1999.327 - 346.
  • 10T ELGamal. A public key cryptosystem and a signature scheme based on discrete logariyhems [J]. IEEE Transactions on lnformation Theory 31.1985.469 - 472.

同被引文献74

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部