期刊文献+

一种基于门限担保证书的分布式私钥元分配方案 被引量:3

Distributed secret share distribution scheme based on threshold warrant certificates
下载PDF
导出
摘要 由于动态拓扑等特点,Ad Hoc网络通常采用分布式CA认证模型为节点提供可靠的认证服务,但现有的方案没有解决私钥元分配之前的安全审核问题。为此,提出了一种基于门限担保证书的分布式私钥元分配方案,对申请私钥元的节点进行严格的审核,可以有效防止多个恶意节点合谋重构系统私钥,确保只有可信且服务质量好的节点能够得到私钥元。从理论上分析了方案的安全性以及成功率,并借助NS2仿真证实了方案的有效性。 Ad Hoc network often supplies reliable authentication service for nodes by distributed certificate authority authentication model due to its dynamic topology and other characteristics; however, the problem of secure auditing is not solved by existing schemes. Therefore, a distributed secret share distribution scheme was put forward based on threshold warrant certificates, which carried out strict auditing towards the nodes that applied for secret shares, and could effectively withstand several malicious nodes working together to recover the secret key of system, and make sure that only the credible and high-quality-service nodes were able to gain the secret shares. In the end, the security and success probability of the scheme were analyzed in theory, and its effectiveness was confirmed by simulations.
出处 《计算机应用》 CSCD 北大核心 2008年第6期1385-1387,1391,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60503012)
关键词 ADHOC网络 分布式 认证 私钥元 担保证书 Ad Hoc network distributed authentication secret share warrant certificate
  • 相关文献

参考文献10

  • 1SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979,22(1):612-613.
  • 2ZHOU L, HAAS Z. Securing Ad Hoc networks[J]. IEEE Network, 2000, 13(6):24-30.
  • 3KONG JIE-JUN, ZERFOS P, LUO HAI-YUN, et al. Providing robust and ubiquitous security support for mobile Ad Hoc networks [ C]// 9th International Conference on Network Protocols ( ICNP). Washington: IEEE Computer Society, 2001:251 - 261.
  • 4OSTROVSKY R, YUNG M. How to withstand mobile virus attacks [C]// Proceedings of the 10th ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1991:51 -59.
  • 5HERZBERG A, JARECHI S, KRAWCZYK H, et al. Proactive secret sharing or: how to cope with perpetual leakage [C]//Advances in cryptography-Crypto '95, LNCS 963. Berlin: Springer-Verlag, 1998:963-976.
  • 6DONG Y, SUN AI-FEN, YIU S M, et al. Providing distributed certificate authority service in cluster-based mobile Ad Hoc networks [ J]. Computer Communications, 2007, 30(11/12) : 2442 - 2452.
  • 7艾东知,Ad Hoc网分布式认证的研究[D].上海:复旦大学,2004.
  • 8BETTSTETTER C, WAGNER C. The spatial node distribution of the random waypoint mobility model [ C]// Proceedings of the 1st German Workshop on Mobile Ad Hoc Networks (WMAN). Ulm, Germany: GI, 2002:41-58.
  • 9CAMP T, BOLENG J, DAVIES V. A Survey of Mobility Models for Ad Hoc Network Research [ J]. Wireless Communication & Mobile Computing: Special issue on Mobile Ad Hoc Networking: research, Trends and Application, 2002, 2(5) : 483 - 502.
  • 10BECHLER M, HOF H-J, KRAFT D, et al. A cluster-based security architecture for Ad Hoc networks [ C]// 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004). Washington: IEEE Press, 2004, 4:2393-2403.

共引文献1

同被引文献16

  • 1孙磊,葛临东.移动自组网多层分布式认证技术研究[J].计算机工程与应用,2005,41(22):168-170. 被引量:3
  • 2冯宾,刘曙光,李小兵.对PKI私钥漫游的研究[J].微电子学与计算机,2005,22(11):79-81. 被引量:1
  • 3王滨,张远洋.一次性口令身份认证方案的分析与改进[J].计算机工程,2006,32(14):149-150. 被引量:20
  • 4杨宗凯,谢海涛,程文青,谭运猛.一种基于身份的分布式会议密钥分发方案[J].计算机科学,2007,34(1):115-116. 被引量:2
  • 5Shamir A.How to share a secret[J].Communications of the ACM,1979.22(11):612-613.
  • 6Zhou Li-dong,Hass z J.Securing Ad Hoe networks[J].IEEE Networks.1999(11/12):24-29.
  • 7Kong jie-jun,Zerfos P,Luo Hai-yun,et al.Providing robust and ubiquitons security support for mobile Ad Hoe networks[C] //9th International Conference on Network Protocols(ICNP).Washington:IEEE Computer Society,2001:251-261.
  • 8Herzberg A,Jarechi s,Krawczyk H,et al.Proactive secret sharing or how to cope with perpetual leakage[C] //LNCS 963:Advances in Cryptography-Crypto 95.Berlin:Springer-Verlag,1998:963-976.
  • 9Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
  • 10Bechler M,Hof H J,Pahlke D K,et al.A Cluster-based Security Architecture for Ad Hoc Networks[C] //Proc.of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies.Hong Kong,China:IEEE Press,2004.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部