期刊文献+

无可信中心的Ad Hoc网络身份认证方案

Identity authentication scheme for Ad Hoc network without trusted party
下载PDF
导出
摘要 利用门限机制,提出了一种基于椭圆曲线密码的Ad Hoc网络身份认证方案。该方案采用椭圆曲线数字签名来生成可验证的证书,无需可信中心,能够有效地抵御网内和网外的攻击者。分析表明,方案的安全性是基于椭圆曲线离散对数问题的难解性,其执行效率较高。 Through threshold mechanism,an identity authentication scheme for Ad Hoc network is proposed based on elliptic curve cryptography.In this scheme,the author can generate verifiable certificate by using elliptic curve digital signature without a trusted party,and the scheme can resist interior and exterior attackers effectively.Analyse show that the security of this scheme is based on the difficulty of solving the elliptic curve cryptography discrete logarithm problem,and its implementation is efficient.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第15期92-93,138,共3页 Computer Engineering and Applications
基金 重庆市自然科学基金(the Natural Science Foundation of Chongqing of China under Grant No.CSTC 2007BB2388)
关键词 椭圆曲线密码 AD HOC 身份认证 数字签名 elliptic curve cryptography,Ad Hoc,identity authentication,digital signature
  • 相关文献

参考文献4

二级参考文献14

  • 1Z J Haas,Parlman.The performance of query control schemes for zone routing protocol [J]. ACM/Trans. Net,2001,9(4) :427 - 438.
  • 2D B Johnson, D A Maltz. Dynamic Source Routing in Ad-Hoc Wireless Networks [M]. Mobile Comp. 1996.153 - 81.
  • 3F Stajano, R Andersson. The resurrecting duckling: Security issues in Ad-hoc wireless networks [ A]. Security Protocols, 7^th International Workshop Proceedings [ C]. LNCS Springer-Verlag, 1999.102 - 105.
  • 4R Gennaro, et al. Robust threshold DSS signatures [ A ]. Advances in Cryptography, Proc. Eurocrypt' 96 [ C ]. Springer-Verlag, 1996.
  • 5Y Frakel, et al. Proactive RSA [ A ]. Advances in Cryptography, Proc.crypt'97 [C]. Springer-Verlag, 1997.440 - 454.
  • 6Lamport, et al. The byzatine generals problem [ J J. ACM Trans On Programming languages and Systems, 1982,4:382 -401.
  • 7Y Desmedt, S Jajodia. Redistributing Secret Shares in New Access Structures and Its Application [ R]. George Masion University, 1997.
  • 8RFC1321 .The MD5 Message Digest Algorithm .
  • 9Lidong Zhou, Zygmunt J Hass. Securing Ad Hoc networks [ J ]. IEEE Network, 1999:24 - 29.
  • 10Tomas Sander, Christian Tschudin. Protecting mobile agents against malicious hosts [R]. Forthcoming LNCS, 1998.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部