期刊文献+

移动自组网基于代理的分布式证书签名算法

Distributed Certification Signature Algorithm Based on Agent in Mobile Ad Hoc Networks
下载PDF
导出
摘要 移动自组网无中心、无基础设施等特性决定了在这种网络中提供证书服务必须采用分布式的体系结构。现有的分布式认证技术是基于(n,t)门限方案的单层结构,当一个节点的单跳邻居节点数目小于系统门限值时就无法正常工作。该文结合Feldman可验证秘密共享策略提出了一种新型基于代理的分布式证书签名算法,一方面可以解决单层分布式证书签名算法中邻居节点数目不足问题,另一方面可以在证书签名合成过程中验证私钥分量正确性,保护系统私钥不泄漏。仿真结果表明,DCS-BA在证书签名成功率和证书平均签名时间方面明显好于普通的分布式证书签名算法。 The certification service must adopt distributed architecture in mobile Ad Hoc networks due to its characteristics such as no infrastructure, no center. Existing distributed authentication technology is one hop architecture based on (n,t) threshold secret sharing cryptography, in which a node can not work properly when the amount of its one hop neighbor is less than threshold value. Combined with Feldman verify scheme, DCS-BA(distributed certification signature based on agent)is proposed, which can solve the lack of neighbor node in the one hop distributed certification signature algorithm, on the other hand, it can verify the validity of private key share, protect the system private key from leaking. Simulation results demonstrate that DCS-BA is better than current distributed certification signature algorithm in certification signature success ratio and average time.
作者 孙磊 葛临东
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第4期155-157,共3页 Computer Engineering
关键词 移动自组网 可验证秘密共享 基于代理的分布式证书签名 Mobile Ad Hoc network Verified secret sharing Distributed certification signature based on agent(DCS-BA)
  • 相关文献

参考文献5

  • 1Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2熊焰,苗付友,张伟超,王行甫.移动自组网中基于多跳步加密签名函数签名的分布式认证[J].电子学报,2003,31(2):161-165. 被引量:31
  • 3Kong Jiejun,Zerfos P.Providing Robust and Ubiquitous Security support for Mobel Ad-Hoc Networks[C].Proc.of 9th International Conference on Network Protocol (INCP) Riverside,California,2001.
  • 4Feldman P.A Practical Scheme for Non-interactive Verifiable Secret Sharing[C].Proc.of the 28th IEEE Ann.Symp.on Foundations of Computer Science,1987:427-437.
  • 5Peterson K.ID-based Signatures from Pairings on Elliptic Curves[R].Cryptology-eprint-archive Report,2002-04.

二级参考文献12

  • 1Z J Haas,Parlman.The performance of query control schemes for zone routing protocol [J]. ACM/Trans. Net,2001,9(4) :427 - 438.
  • 2D B Johnson, D A Maltz. Dynamic Source Routing in Ad-Hoc Wireless Networks [M]. Mobile Comp. 1996.153 - 81.
  • 3F Stajano, R Andersson. The resurrecting duckling: Security issues in Ad-hoc wireless networks [ A]. Security Protocols, 7^th International Workshop Proceedings [ C]. LNCS Springer-Verlag, 1999.102 - 105.
  • 4R Gennaro, et al. Robust threshold DSS signatures [ A ]. Advances in Cryptography, Proc. Eurocrypt' 96 [ C ]. Springer-Verlag, 1996.
  • 5Y Frakel, et al. Proactive RSA [ A ]. Advances in Cryptography, Proc.crypt'97 [C]. Springer-Verlag, 1997.440 - 454.
  • 6Lamport, et al. The byzatine generals problem [ J J. ACM Trans On Programming languages and Systems, 1982,4:382 -401.
  • 7Y Desmedt, S Jajodia. Redistributing Secret Shares in New Access Structures and Its Application [ R]. George Masion University, 1997.
  • 8RFC1321 .The MD5 Message Digest Algorithm .
  • 9Lidong Zhou, Zygmunt J Hass. Securing Ad Hoc networks [ J ]. IEEE Network, 1999:24 - 29.
  • 10Tomas Sander, Christian Tschudin. Protecting mobile agents against malicious hosts [R]. Forthcoming LNCS, 1998.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部