期刊文献+

分布式CA在移动自组网中的应用

Distributed CA for Mobile Ad hoc Networks
下载PDF
导出
摘要 提出了一个基于门限和椭圆曲线算法的SFDCA(Security Framework of D istributed CA)安全框架结构。SFDCA中采用了分布式CA的安全机制、门限密钥管理、椭圆曲线算法、基于设备资源的选举算法和动态网络分簇思想。分布式CA和门限密钥管理的应用增加了系统的安全性和容错性;椭圆曲线算法的应用减少了对移动节点性能的要求;分簇算法的应用减少了对节点容量的要求;基于资源的选举算法的应用提高了系统的签名效率,同时有利于设备资源利用的负载平衡。 In this paper, we proposed a Security Framework of Distributed CA for Manet (Mobile Ad hoc Networks). The key elements of the framework are : distributed CA based on threshold cryptosystem which can provide a highly secure and highly available. The application of Elliptic Curve Cryptography (ECC) which is appropriate for mobile nodes with limited computational power. A scheme for dynamically partitioning the network into smaller clusters of nodes based on nodal mobility which can reduce the storage of node. A scheme for election based on the resource which can improve the efficiency of distributed signature and be favor of the system load balance of the usage of device resorce.
出处 《计算机应用研究》 CSCD 北大核心 2006年第9期213-215,共3页 Application Research of Computers
基金 航空基金资助项目(04C52009 05F2037) 国家"十五"预研基金资助项目(41801150201)
关键词 移动自组网 门限算法 分布式签名 椭圆曲线算法 Manet Threshold Cryptography Distributed Signature Elliptic Curve Cryptography
  • 相关文献

参考文献7

二级参考文献32

  • 1冯登国 裴定一.密码学导论[M].北京:科学出版社,1999..
  • 2M. Malkin, T. Wu, D. Boneh. Building intrusion tolerant application. The 8th USENIX Security Symposium, Washington,D.C., 1999.
  • 3Y. Desmedt. Some recent research aspects of threshold cryptography. In: E. Okamoto, G. Davida, M. Mambo, eds.Proc. the 1st Int'l Information Security Workshop, Lecture Notes in Computer Science 1396. New York: Spring-Verlag, 1997. 158~ 173.
  • 4T. Rabin. A simplified approach to threshold and proactive RSA.In: H. Krawczyk, ed. Advances in Cryptology-CRYPTO' 98,Lecture Notes in Computer Science 1462. New York: SpringerVerlag, 1998. 89~104.
  • 5V. Shoup. Practical threshold signatures. IBM Zurich Research Lab, Tech. Rep.: RZ 3121, 1999.
  • 6A. Herzberg, S. Jarekci, H. Krawczyk, et al. Proactive secret sharing or: How to cope with perpetual leakage. CRYPTO 1995,the 15th Annual Int'l Cryptology Conf., Santa Barbara,California, 1995.
  • 7A. Herzberg, M. Jakobsson, S. Jarecki, et al. Proactive public key and signature systems. The 1997 ACM Conf. Computers and Communication Security, Zurich, Switzerland, 1997.
  • 8Y. Desmedt, S. Jajodia. Redistributing secret shares to new access structures and its application. George Mason University,Fairfax, VA, Tech. Rep.: ISSE TR-97-01, 1997.
  • 9T. P. Pedersen. Distributed provers with applications to undeniable signatures. In: Proc. Eurocrypt'91, Lecture Notes in Computer Science 547. New York: Springer-Verlag, 1991. 221~238.
  • 10A. Shamir. How to share a secret. Communications of the ACM,1979, 22(11): 612~613.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部