期刊文献+

基于Ad hoc的门限密钥更新研究

Threshold Key Updating Based on Ad hoc Network
下载PDF
导出
摘要 研究了群通信,并重点分析了门限密钥管理方案,提出了一种基于Ad hoc的门限密钥更新方案,实现了在动态的Ad hoc中进行群通信,保证门限密钥秘密更新的安全性,同时简化了通信流程,提高了管理效率。 Group communication was studied with emphasis on threshold key system. An update scheme for Ad hoe based threshold key system was proposed, which simplified communication process and improved management efficiency. With this scheme, group communication in dynamic ad hoc network was enabled, and security of secret key updating was ensured.
出处 《微电子学》 CAS CSCD 北大核心 2009年第5期666-669,共4页 Microelectronics
关键词 群通信 AD HOC 密钥更新 Group communication Ad hoc Key updating
  • 相关文献

参考文献15

  • 1CHEN W, JAIN N, SINGH S. Ad hoe network management protocol [J]. IEEE J Selected Areas in Communications, 1999, 17(8): 1506-1531.
  • 2邹娟.无线AdHoc网络中的密钥管理和接入认证研究.西安电子科技大学学报,2005,25(6):25-36.
  • 3王晓峰,张璟,王尚平,张亚玲,秦波.基于口令认证的移动Ad Hoc网密钥协商方案[J].软件学报,2006,17(8):1811-1817. 被引量:18
  • 4刘蓬涛,李大兴.基于Lagrange插值多项式的门限方案的实现[J].计算机工程与应用,2005,41(36):117-119. 被引量:5
  • 5李先贤,怀进鹏,刘旭东.群密钥分配的动态安全性及其方案[J].计算机学报,2002,25(4):337-345. 被引量:26
  • 6ZHOUL-D, HASS Z J. Securing in Ad-hoc networks [J]. IEEE Networks, 1999, 3(6): 24-30.
  • 7ZHOU L, HASS Z J. Securing ad hoe networks [J]. IEEE Network Magazine, 1999, 13(6): 24-30.
  • 8SHAMIR A. How to share a secret[J]. Communications of ACM, 1979, 22(11): 612-613.
  • 9YANG C C, CHANG T Y, HWANG M S. A (t, n) multi-secret sharing scheme [J]. Applied Mathematics and Computation, 2004, 151(41):483-490.
  • 10SANTIS A D, MASUCCI B. New results on nonperfect sharing of multiple secrets [J]. J Systems and Software, 2007, 80(52): 216-223.

二级参考文献29

  • 1隋爱芬,杨义先,钮心忻,罗守山.基于椭圆曲线密码的可认证密钥协商协议的研究[J].北京邮电大学学报,2004,27(3):28-32. 被引量:27
  • 2王自强,张春,王志华.无线接收机结构设计[J].微电子学,2004,34(4):455-459. 被引量:17
  • 3邢渝华,樊祥宁.宽带无线接入OFDM系统信道估计技术研究[J].通信学报,2005,26(B01):209-212. 被引量:1
  • 4汪润来,邵菊花,唐贻莲,高腾飞,杨荣喜.基于0.35μm SiGe工艺的高速高精度CORDIC处理器的ASIC实现[J].微电子学,2007,37(2):234-237. 被引量:3
  • 5[1]Ateniese G, Chevassut D, Hasse D et al. The design of a group key agreement API. In: Proc DARPA Information Survivability Conference and Exposition, SC, USA, 2000. 115-126
  • 6[2]Caronni G, Waldvogel M, Sun D et al. Efficient security for large and dynamic groups. In: Proc the 7th Workshop on Enabling Technologies, (WET ICE'98), Stanford, California, USA,1998. 376-383. http://www.computer.org/ proceedings/wetice/8751/8751toc.htm
  • 7[3]Lakshminath R, Mukherjee S, Sama A. A dual encryption protocol for scalable secure multicasting. In: Proc the 4th IEEE Symposium on Computers and Communications, Red Sea, Egypt, 1999. 2-8
  • 8[4]Gong L, Shacham N. Elements of trusted multicasting. In: Proc IEEE International Conference on Network Protocols, Boston, MA, USA, 1994. 23-30
  • 9[5]Harney H, Muckenhirn C. Group Key Management Protocol (GKMP) Architecture. RFC 2094, 1997
  • 10[6]Blundo C, Santis A D, Herzberg A et al. Perfectly-secure key distribution for dynamic conferences. In: Proc CRYPTO'92, California, USA, 1992. 471-486

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部