期刊文献+

分布式密钥产生技术在移动Ad Hoc网络中的应用 被引量:1

Application of Distributed Key Generation in Mobile AD HOC Network
下载PDF
导出
摘要 介绍了移动adhoc网络基于门限机制的证书服务技术,并指出了该技术采用的临时中心存在的缺点与不安全性。提出了基于椭圆曲线的分布式密钥产生技术,使基于门限机制的移动adhoc网络证书服务彻底消除中心。最后通过算法分析,得出方案的可行性。 This paper introduces service technology based on threshold cryptographic scheme deeply and indicate disadvantage and unsafty of temporal center.Bring forward distributed key generation arithmetic based on ECDSA(ellipse curve cryptosystem),which make certification service center is removed drastically.At the end,the feasibility of the arithmetic is realized.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第26期152-153,232,共3页 Computer Engineering and Applications
基金 "十五" "211工程"重点学科建设项目:信息安全保密技术与相关数学理论研究(编号:181070H901) 信息产业部项目:安全网管技术(编号:211070B414)
关键词 门限密钥共享 DKG 分布式认证 threshold secret sharing,DKG,centralized authority
  • 相关文献

参考文献3

  • 1Shamir A.How to Share a Secret[J].Communications of the ACM, 1979 ;22( 11 ) :612-613.
  • 2Kong Jiejun,Zerfos P.Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks[C].In:the 9th International Conference on Network Protocols,2001-11.
  • 3Krawczyk,T Rabin.Secure distributed key generation for discrete-log based cryptosystems[C].In:Advance in Cryptology- EUROCRYPT99, LNCS 1592,Springer-Verlag, 1999 : 295 -310.

同被引文献5

  • 1[1]Zhou L,Haas Z J.Securing Ad hoc Networks[J].IEEE Networks,1999.11,13(6):24~30.
  • 2[2]Luo H,Zerfos P,Kong J,et al.Self-securing Ad hoc wirelessnetworks[A].IEEE ISCC[C].2002.
  • 3[3]Lin C H R,Gerla M A.distributed architecture for multimedia in dynamic wireless networks[A].IEEE Globecom[C].1995:468~472.
  • 4[4]Pedersen T A.threshold cryptosystem without a trusted party[A].In EUROCRYPT91[C],Springer-Verlag,Berlin:1991:522~626.
  • 5[6]Feldman P A.Practical Scheme for Non -Interactive Verifiabie Secret Sharing[A].In Proc.28th FOCS:427~437.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部