期刊文献+

基于双线性对的AdHoc网络门限身份认证方案 被引量:2

Threshold Authentication Scheme of Ad Hoc Network Based on Bilinear Pairings
下载PDF
导出
摘要 研究移动Ad Hoc网络特有的安全威胁,提出一种基于双线性对、无可信中心的门限身份认证方案。该方案能有效减少网络中各节点的存储代价和运算量,抵御内部节点攻击和被动攻击。与已有Ad Hoc门限身份认证方案相比,其证书生成速度快、计算复杂度低。 This paper studies the proper threat of mobile Ad Hoc network, and proposes a threshold authentication scheme without the trusted center based on bilinear pairings. The cost of storage and computational capacity, requiring of each node, can be effectively reduced and security problems such as inner nodes attack, passive attack can be solved. Compared with the existent protocol, this scheme is faster in generating certificate and has lower complexity of computing.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第1期147-149,共3页 Computer Engineering
关键词 AD HOC网络 双线性对 概率签名方案 门限身份认证 Ad Hoc network bilinear pairings probability signature scheme threshold authentication
  • 相关文献

参考文献7

  • 1Vergados D D, Stergiou G. An Authentication Scheme for Ad Hoc Networks Using Threshold Secret Sharing[J]. Wireless Personal Communications, 2007, 43(4): 1767-1780.
  • 2曹爱霞,赵一鸣.Ad Hoc网络中基于身份的认证密钥交换协议[J].计算机工程,2007,33(10):150-152. 被引量:3
  • 3Venkatraman L, Agrawal D E A Novel Authentication Scheme for Ad Hoc Networks[C]//Proc. of Wireless Communications and Networking Conference.[S. l.]: IEEE Press, 2000.
  • 4Yao Jun, Zeng Guihua. Key Agreement and Identity Authentication Protocols for Ad Hoc Networks[C]//Proc. of Conference on Information Technology: Coding and Computing. [S. l.]: IEEE Press, 2004.
  • 5Boneh D, Franklin M. ID-based Encryption from the Weil-pairing[J]. SIAM Journal on Computing, 2003, 32(3): 586-615.
  • 6Boldyreva A. Threshold Signature, Multisignature and Blind Signature Schemes Based on the Gap-diffe-hellman-group Signature Scheme[M]. Berlin, Germany: Springer-Verlag, 2003.
  • 7Boneh D, Lynn B, Shacham H. Short Signatures from the Weil- Pairing[J]. Journal of Cryptology, 2001, 17(4): 514-532.

二级参考文献3

  • 1Eun K R,Eun J Y,Kee Y Y.An Efficient ID-based Authenticated Key Agreement Protocol from Pairings[C]//Proceedings of the 3rd International IFPS-TC6 Networking Conference.2004.
  • 2Khalili A,Katz J,Arbaugh W A.Toward Secure Key Distribution in Truly Ad-hoc Networks[C]//Proceedings of Applications and the Internet Workshops.2003.
  • 3Luo H,Lu S.Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks[R].Los Angeles:Dept.of Computer Science,University of California,Technical Report:TR-200030,2000.

共引文献2

同被引文献17

  • 1庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 2薛辉,王再芊,梁晶,王平,安凯.网络身份认证若干安全问题及其解决方案[J].计算机与数字工程,2007,35(1):81-83. 被引量:6
  • 3ZHOU L D, HASS Z J. Securing ad hoc networks[J]. IEEE Network, Special Issue on Network Security, 1999, 13(6): 24-30.
  • 4DA SILVA E, DOS SANTOS A, ALBINI L C E et al. Identity-based key management in mobile ad hoc networks: techniques and applications[J]. IEEE Wireless Communications, 2008, 15(5): 46-52.
  • 5LUO H, ZEFROS P, KONG J, et al. Self-securing ad hoc wireless networks[A]. Proceeding of the Seventh IEEE Symposium on Computers and Communications (ISCC'02)[C]. Taormina, Italy, 2002. 548-555.
  • 6KHALILI A, KATZ J. Toward secure key distribution in truly Ad-Hoc networks[A]. Proceedings of the Symposium on Applications and the Internet Workshops (SAINT03)[C]. Orlando, FL, USA, 2003. 342-346.
  • 7BONEH D, FRANKLIN M K. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
  • 8DENG H, MUKHERJEE A, AGRAWAL D E Threshold and identity-based key management and authentication for wireless ad hoe networks[A]. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)[C]. Las Vegas, USA, 2004. 107-110.
  • 9SUI A, CHOW S, HUI L, et al. Separable and anonymous identity-based key issuing without secure channel[A]. Proceedings of the 1st International Workshop on Security in Networks and Distributed Systems (SNDS'05)[C]. Fukuoka, Japan, 2005. 275-279.
  • 10KWON S, LEE S H. Identity-based key issuing without secure channel in a broad area[A]. Proceedings of the 7th International Workshop on Information Security Applications (WISA'06)[C]. Jeju Island, Korea, 2006. 30-44.

引证文献2

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部