期刊文献+

空间网络中基于身份的分布式密钥管理研究 被引量:18

Research on Identity-based Distributed Key Management in Space Network
下载PDF
导出
摘要 为解决在空间网络中实施集中式密钥管理困难以及维护公钥证书开销过大等问题,论文设计了一种基于身份的分布式密钥管理方案。结合空间网络特点,给出了分布式私钥生成中心的构建方法。并利用Boneh和Franklin提出的基于身份的公钥加密体制,设计了私钥更新、主密钥分量更新和会话密钥协商等策略。分析和仿真验证,该方案能满足安全要求,具有较好的扩展性。 In order to resolve the problems of concentrating key management and over-consumption on certificate maintenance in space network, an identity-based distributed key management scheme is proposed. On the basis of the properties of space network, the method for constructing distributed private key generators is put forward. According to identity-based cryptography proposed by Boneh and Franklin, the scheme designs the methods of updating private key, updating host-key shares and negotiating session key. Analysis and simulation show that the scheme can meet the safety requirements and has good scalability.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第1期183-188,共6页 Journal of Electronics & Information Technology
基金 国家863计划项目(2006AAJ124)资助课题
关键词 空间网络 基于身份的密码体制 门限机制 密钥管理 Space network Identity-based cryptography Threshold mechanism Key management
  • 相关文献

参考文献8

  • 1Bhasin K and Hayden J L. Space internet architectures and technologies for NASA Enterprises [J].International Journal of Satellite Communications, 2002, 20(5): 311- 332.
  • 2杨德明,慕德俊,许钟.Ad hoc空间网络密钥管理与认证方案[J].通信学报,2006,27(8):104-107. 被引量:17
  • 3彭长艳,沈亚敏,王剑,张权,唐朝京.基于身份的空间网络安全研究[J].飞行器测控学报,2008,27(3):56-62. 被引量:8
  • 4Deng H, Mukherjee A, and Agrawal P. Threshold and identity-based key management and authentication for wireless ad hoc networks [C]. Proc of IEEE International Conferences on Information Technology (ITCC'04)L 2004: 412-414.
  • 5杜春来,胡铭曾,张宏莉.在椭圆曲线域中基于身份认证的移动ad hoc密钥管理框架[J].通信学报,2007,28(12):53-59. 被引量:20
  • 6Shamir A. Identity Based crypto systems and signature schemes[C]. Proc. CRYPTO'84, 1984: 47-53.
  • 7Boneh D and Franklin M. Dentity-based encryption forms the Well pairing[C]. In: Kilian J. ed. Advances in Cryptology CRYPTO 2001, Lecture Notes in Computer Science 2139. Berlin: Springer-Verlag, 2001: 213-229,.
  • 8Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.

二级参考文献24

  • 1王剑,张权,唐朝京.空间Internet的安全体系结构[J].中国空间科学技术,2006,26(1):40-47. 被引量:5
  • 2沈荣骏.我国天地一体化航天互联网构想[J].中国工程科学,2006,8(10):19-30. 被引量:130
  • 3SHEN C C, BORKAR G. RAJAGOPALAN S, et al, Interrogation-based relay routing for ad hoc satellite networks[A]. Proceedingsof IEEE Globecom 2002[C]. 2002. 264-275.
  • 4PRESCOTT G E, SMITH S A, MOE K, Real time information system technology challenges for NASA's earth science enterprise[A]. The 20th IEEE Real-Time Systems Symposium[C]. 1999.1-6
  • 5SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 6ZHOU L, ZYGMUNT J H. Securing ad hoc networks[J]. IEEE Network, 1999,13(6):24-30.
  • 7ANDERSON R J, BERGADANO E CRISPO B, et al. A new family of authentication protocols[J]. Operating Systems Review, 1998, 32(4): 9-20.
  • 8BALFANZ D, SMETrERS D, STEWART E et al. Talking to strangers: Authentication in ad hoc wireless networks[A]. Symposium on Network and Distributed Systems Security[C].2002.2-14.
  • 9DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
  • 10LACY J B, MITCHELL D E SCHELL W M. CryptoLib: cryptography in software[A]. UNIX Security Symposium IV Proceedings[C].1993. 1-17.

共引文献38

同被引文献139

引证文献18

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部