期刊文献+

基于组合公钥和秘密共享的Ad Hoc密钥管理方案

Key management scheme for Ad Hoc based on combined public key and secret sharing
下载PDF
导出
摘要 移动Ad Hoc网络是一种特殊的网络,其自组特性决定它将面临严重的安全问题。基于椭圆曲线密码体制,提出了一种适合于Ad Hoc网络的密钥管理方案,该方案利用了组合公钥和完全分布式秘密共享,无需可信中心的参与和公钥证书,可扩展性强,能够有效地抵御网内和网外的攻击者。分析表明,方案的安全性是基于椭圆曲线离散对数问题的难解性,其执行效率较高。 Mobile Ad Hoc is a special network,its self-organized characteristic makes it face serious security problems.Based on Elliptic curve cryptosystem,a key management scheme for Ad Hoe is proposed.In this scheme we make use of combined public key and fully distributed secret sharing,so it doesn't need a trusted centre and public key certificates,high extensibility,and it can resist interior and exterior attackers effectively.Analysis show that the security of this scheme is based on the difficulty of solving the elliptic curve cryptography discrete logarithm problem,and its implementation is efficient.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第17期82-84,共3页 Computer Engineering and Applications
基金 重庆市自然科学基金(No.CSTC 2007BB2388)~~
关键词 组合公钥 秘密共享 椭圆曲线密码 Ad HOC combined public key secret sharing elliptic curve cryptography Ad Hoc
  • 相关文献

参考文献6

  • 1Liu Chun,Liu Jianwei,Zhang Qishan.A new key management method for Ad Hoc networks[C]//CHINACOM.First International Conference on Communications and Networking in China.Beijing:Telecom Press, 2006:1 4.
  • 2Shamir A.How to share a secret[J].Communications of the ACM, 1979,22( 11 ) :612-613.
  • 3Zhou Lidong,Hass Z J.Securing ad hoe networks[J].IEEE Networks, 1999,13(6) :24-30.
  • 4刘淳,刘建伟,张其善,李晖.一种无证书Ad hoc密钥管理与认证模型[J].西安电子科技大学学报,2007,34(6):974-979. 被引量:5
  • 5唐文,南相浩,陈钟.基于椭圆曲线密码系统的组合公钥技术[J].计算机工程与应用,2003,39(21):1-3. 被引量:25
  • 6Pedersen T P.Distributed provers with applications to undeniable signatures[C]//LNCS 547:Proc of Eurocrypt'91,Lecture Notes in Computer Science.Berlin:Springer-Verlag, 1991:221-238.

二级参考文献10

  • 1南相浩 唐文 余嘉宁.ECC组合公钥[A]..中国计算机学会信息保密专业委员会论文集:第11卷[C].,2001-09..
  • 2N Koblitz.Elliptic curve cryptosystems[J].Mathematics of Computation, 1987 ;48 : 203-209.
  • 3V Miller.Uses of elliptic curves in cryptography[C].In:Advances in Cryptology-Crypto'85 ,LNCS 218,1986:417,426.
  • 4Zhou L, Haas Z J. Securing Ad Hoc Networks [J]. IEEE Network, 1999, 13(6):24-30.
  • 5Luo H, Lu S. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks [EB/OL]. [2000-11-12]. http://eiteseer, ist. psu. edu/luo00uhiquitous. html.
  • 6Khalili A, Katz J, Arbaugh W. Toward Secure Key Distribution in Truly Ad-Hoc Networks [C]//IEEE Symposium on Applications and the Internet Workshops. Piscataway: IEEE, 2003: 342-346.
  • 7Deng Hongmei, Anindo M, Agrawal D P. Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoe Networks [C]//IEEE International Conference on Information Technology: Coding Computing, ITCC. Orleans: Institute of Electrical and Electronics Engineers Computer Society, 2004: 107-111.
  • 8Bonh D, Franklin M. Identity-based Encryption from Well Pairing [J]. SIAM Journal on Computing, 2003, 2(32): 586- 615.
  • 9毛文波.现代密码学理论与实践[M].北京:电子工业出版社,2006:307-308.
  • 10Abadi M, Needham R. Prudent Engineering Practice for Cryptographic [C]//IEEE Protocols Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. Piscataway: IEEE, 1994: 122-136.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部