期刊文献+

移动自组网多层分布式认证技术研究 被引量:3

Research on Multi-layer Distribute Authentication Technology in Mobile Ad Hoc Networks
下载PDF
导出
摘要 移动自组网是一种新型的移动网络,它的无中心、无基础设施等特性决定了在这种网络中提供证书服务必须采用分布式的体系结构。现有的分布式认证技术是基于(n,t)门限方案的单层结构,当一个节点的单跳邻居节点数目小于系统门限值时就无法正常工作。该文结合Feldman可验证秘密共享策略提出了一种多层分布式认证技术,一方面可以解决单层分布式认证技术中邻居节点数目不足问题,另一方面可以在证书签名合成中验证私钥分量正确性,保护系统私钥不泄漏。 Mobile Ad Hoe Networks is a new kind of mobile network.The certification service must adopt distribute architecture in the network due to its characteristics such as no infrastructure,no center.Existing distribute authentication technology is one hop architecture based on(n,t) threshold secret sharing cryptography,a node can not work properly when the value of its one hop neighbor is less than threshold value.This paper proposes multi-layer distribute authentication technology combined with Feldman verify scheme,which can solve the lack of neighbor node in the one hop distribute authentication technology,on the other hand can verify the validity of private key share,protect the system pr ivate key from leaking.
作者 孙磊 葛临东
出处 《计算机工程与应用》 CSCD 北大核心 2005年第22期168-170,共3页 Computer Engineering and Applications
关键词 移动自组网 门限秘密共享 可验证秘密共享 多层分布式认证 Mobile Ad Hoc Networks,threshold secret sharing,verify secret sharing,multi-layer distribute authentication
  • 相关文献

参考文献6

  • 1熊焰,苗付友,张伟超,王行甫.移动自组网中基于多跳步加密签名函数签名的分布式认证[J].电子学报,2003,31(2):161-165. 被引量:31
  • 2.[EB/OL].http:∥www.ietf. org/html.charters/manet-charter.html IETF Mobile Ad hoc Networks charter,.
  • 3Shamir A.How to Share a Secret[J].Communications of the ACM,1979 ;22(11 ) :612~613.
  • 4Lidong Zhou,Zygmunt J Hass. Securing Ad Hoc networks[J].IEEE Networks, 1999: 24~29.
  • 5Kong Jiejun,Zerfos P et al.Providing Robust and Ubiquitous Security support for Mobel Ad-Hoc Networks[C].In:9th International Conference on Network Protocol(INCP),Riverside,California,2001.
  • 6Feldman P.A practical scheme for non-interactive verifiable secret sharing[C].In:Proc of the 28th IEEE Ann Symp on Foundations of Computer Science, IEEE, 1987: 427~437.

二级参考文献12

  • 1Z J Haas,Parlman.The performance of query control schemes for zone routing protocol [J]. ACM/Trans. Net,2001,9(4) :427 - 438.
  • 2D B Johnson, D A Maltz. Dynamic Source Routing in Ad-Hoc Wireless Networks [M]. Mobile Comp. 1996.153 - 81.
  • 3F Stajano, R Andersson. The resurrecting duckling: Security issues in Ad-hoc wireless networks [ A]. Security Protocols, 7^th International Workshop Proceedings [ C]. LNCS Springer-Verlag, 1999.102 - 105.
  • 4R Gennaro, et al. Robust threshold DSS signatures [ A ]. Advances in Cryptography, Proc. Eurocrypt' 96 [ C ]. Springer-Verlag, 1996.
  • 5Y Frakel, et al. Proactive RSA [ A ]. Advances in Cryptography, Proc.crypt'97 [C]. Springer-Verlag, 1997.440 - 454.
  • 6Lamport, et al. The byzatine generals problem [ J J. ACM Trans On Programming languages and Systems, 1982,4:382 -401.
  • 7Y Desmedt, S Jajodia. Redistributing Secret Shares in New Access Structures and Its Application [ R]. George Masion University, 1997.
  • 8RFC1321 .The MD5 Message Digest Algorithm .
  • 9Lidong Zhou, Zygmunt J Hass. Securing Ad Hoc networks [ J ]. IEEE Network, 1999:24 - 29.
  • 10Tomas Sander, Christian Tschudin. Protecting mobile agents against malicious hosts [R]. Forthcoming LNCS, 1998.

共引文献30

同被引文献11

  • 1Shamir A.How to share a secret[J].Communications of the ACM, 1979,22( 11 ):612-613.
  • 2Kong Jiejun,Zerfos P.Providing robust and ubiquitous secrity support for mobel ad-hoc networks[C]//the 9th International Conference on Network Protocol(INCP),Riverside,Califomia,2001.
  • 3Dong Y,Sui A F.Providing distributed certificate authority service in cluster[J].Computer Communications,2007,30:2442-2452.
  • 4Feldman P.A practical scheme for non-interactive verifiable secret sharing[C]//Proc of the 28th IEEE Ann Syrup on Foundations of Computer Science,IEEE, 1987:427-437.
  • 5Shamir A.How to share a secret[J].Communications of the ACM,1979.22(11):612-613.
  • 6Zhou Li-dong,Hass z J.Securing Ad Hoe networks[J].IEEE Networks.1999(11/12):24-29.
  • 7Kong jie-jun,Zerfos P,Luo Hai-yun,et al.Providing robust and ubiquitons security support for mobile Ad Hoe networks[C] //9th International Conference on Network Protocols(ICNP).Washington:IEEE Computer Society,2001:251-261.
  • 8Herzberg A,Jarechi s,Krawczyk H,et al.Proactive secret sharing or how to cope with perpetual leakage[C] //LNCS 963:Advances in Cryptography-Crypto 95.Berlin:Springer-Verlag,1998:963-976.
  • 9艾东知,Ad Hoc网分布式认证的研究[D].上海:复旦大学,2004.
  • 10黄河,王亚弟,韩继红,王衡军.一种基于门限担保证书的分布式私钥元分配方案[J].计算机应用,2008,28(6):1385-1387. 被引量:3

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部