期刊文献+

一种无证书Ad hoc密钥管理与认证模型 被引量:5

A non-certificated Ad hoc key management and authentication model
下载PDF
导出
摘要 设计了一种用于Ad hoc网络的新密钥管理与认证模型.该模型应用椭圆曲线组合公钥技术,仅在密钥初始化阶段需要可信认证中心的支持.在网络运行阶段,应用门限密码技术实现了自组织的节点公私密钥对更新和撤销,以及共享私钥种子矩阵更新.设计了一种认证与密钥协商协议,协议中用计算的方法产生公钥,减少了两次证书传递过程和验证运算.相比基于证书和基于身份的模型,新模型的安全性、灵活性和效率更高,适合Ad hoc网络自组织和资源受限的特点. A new key management and authentication model for Ad hoc networks is proposed. In this model, the elliptic curve combined public key is applied, and the trusted authentication center support is needed only in the key initialization phase. In the operation phase, the self-organized public/private key update, revocation, and shared-private-key-matrix update are implemented with threshold cryptograph. An authentication and key agreement protocol is designed. The interlocutor's public key is produced by computing, and two-time certificate transmission and verification are therefore reduced in the protocol. Compared with the certificate-based and the identity-based models, the new model is more secure, flexible and efficient. And it is more suitable for the self-organized and resource-constrained features of Ad hoc networks.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2007年第6期974-979,共6页 Journal of Xidian University
基金 国家自然科学基金资助(60672102)
关键词 组合公钥 门限密码 Ad HOC网络 密钥管理 认证 椭圆曲线 combined public key threshold cryptograph Ad hoc network key management authentication elliptic curve
  • 相关文献

参考文献7

  • 1Zhou L, Haas Z J. Securing Ad Hoc Networks [J]. IEEE Network, 1999, 13(6):24-30.
  • 2Luo H, Lu S. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks [EB/OL]. [2000-11-12]. http://eiteseer, ist. psu. edu/luo00uhiquitous. html.
  • 3Khalili A, Katz J, Arbaugh W. Toward Secure Key Distribution in Truly Ad-Hoc Networks [C]//IEEE Symposium on Applications and the Internet Workshops. Piscataway: IEEE, 2003: 342-346.
  • 4Deng Hongmei, Anindo M, Agrawal D P. Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoe Networks [C]//IEEE International Conference on Information Technology: Coding Computing, ITCC. Orleans: Institute of Electrical and Electronics Engineers Computer Society, 2004: 107-111.
  • 5Bonh D, Franklin M. Identity-based Encryption from Well Pairing [J]. SIAM Journal on Computing, 2003, 2(32): 586- 615.
  • 6毛文波.现代密码学理论与实践[M].北京:电子工业出版社,2006:307-308.
  • 7Abadi M, Needham R. Prudent Engineering Practice for Cryptographic [C]//IEEE Protocols Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. Piscataway: IEEE, 1994: 122-136.

共引文献6

同被引文献21

  • 1王改香.基于椭圆曲线密码的组合公钥技术CPK[J].山西财经大学学报(高等教育版),2008(S2):125-126. 被引量:3
  • 2叶阿勇,许力.移动Ad Hoc网络AODV路由协议中的黑洞问题[J].计算机工程,2005,31(14):125-126. 被引量:2
  • 3Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 24(11): 612-613.
  • 4Zhou Lidong, Haas Z J. Securing Ad Hoc Networks[J]. IEEE Networks, 1999, 13(6): 24-30.
  • 5Liu Chun,Liu Jianwei,Zhang Qishan.A new key management method for Ad Hoc networks[C]//CHINACOM.First International Conference on Communications and Networking in China.Beijing:Telecom Press, 2006:1 4.
  • 6Shamir A.How to share a secret[J].Communications of the ACM, 1979,22( 11 ) :612-613.
  • 7Zhou Lidong,Hass Z J.Securing ad hoe networks[J].IEEE Networks, 1999,13(6) :24-30.
  • 8Pedersen T P.Distributed provers with applications to undeniable signatures[C]//LNCS 547:Proc of Eurocrypt'91,Lecture Notes in Computer Science.Berlin:Springer-Verlag, 1991:221-238.
  • 9Michael Burrows, Martin Abadi, Roger M. Needham. A Logic of Cryptographic[A]. ACM Transactions on Computer Systems[C]. 1990, 08.
  • 10Ramanathan R, Redi J. A brief overview of ad hoc networks: challenges and direetions[J]. IEEE Communications Magazine, 2002,40 (5) : 20- 22.

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部