期刊文献+

基于身份的无可信中心Ad-hoc密钥管理方案

Identity-based without a Trusted Center Key Management Scheme in Ad-hoc Networks
下载PDF
导出
摘要 针对移动Ad-hoc网络中迫切需要解决的安全问题是建立一个安全、高效、可行的密钥管理系统,提出了一种基于身份无可信中心的适合于Ad-hoc网络密钥管理方案,有效地解决了节点间的信任问题及基于身份密码体制的密钥托管问题,并给出了一种可以为用户在线周期性更新密钥机制。最后证明了所得用户公钥与用户身份的绑定及用户私钥的安全性。 The security issue needed to be solved urgently in mobile Ad-hoc networks is to build a safe,efficient and feasible key management system.This paper presents a suitable Ad-hoc networks key management scheme,which uses identity-based cryptosystem without trusted center.It effectively solves the issue of the trust between nodes and identity-based cryptography key escrow issues.And it gives a user key online periodically update mechanism.finally,It turns out that the obtained public key is binding with the user identity and proved the safety of the user private key.
出处 《计算机安全》 2010年第6期13-15,共3页 Network & Computer Security
基金 国家教育部科学技术研究重点项目(208148) 甘肃省教育厅重点项目(0801-01)
关键词 AD-HOC网络 密钥管理 基于身份 无可信中心 Ad-hoc networks key management identity-based non-trusted center
  • 相关文献

参考文献6

  • 1ZHOU L,HAAS Z J,Securing Ad hoc networks[J].IEEE Networ ks, 1999,15(6):24--30.
  • 2S YI,R KEAVETS.Key management for heterogeneous Ad hoc wireless networks[C]//10th IEEE International Conference on Network,Protocols(ICNP 2002), 2002.
  • 3BOYEN X.Multipurpose id entity--based signcryption:a swissarmy knife for identity--based eryptography[C]//Lecture Notes in Computer Science 2729:Prnc Advancesin Cryptology-CRYPT0 2003. Berlin : Springer-Verlag, 2003 : 383--399.
  • 4TSENG Y M, JAN JK, ChIEN H Y. Digital signature with message recovery using self--certified public keys and its variants[J]. Applied Mathematics and Computation, 2003,136: 203-214.
  • 5WU TS, HSU C L. Threshold proxy signature scheme using self-certified public keys[J]. Journal of System and Software, 2003,67: 89-97.
  • 6李光松,韩文报.基于签密的Ad Hoc网络密钥管理[J].计算机工程与应用,2005,41(12):160-164. 被引量:7

二级参考文献20

  • 1L Zhou,Z J Haas.Securing Ad hoc Networks[J].IEEE Networks,1999; 13(6) :24~30.
  • 2Y Desmedt. Threshold cryptography[J].European Transactions on Telecommunications, 1994; 5 (4): 449~457.
  • 3S Yi,R Kravets. Key Management for Heterogeneous Ad Hoc Wireless Networks[R].Department of Computer Science,University of Illinois,Urbana-Champaign,Technical Report UIUCDCS-R-2002-2290,2002;Poster Presentation, 10th IEEE International Conference on Network Protocols(ICNP 2002),www-sal.cs.uiuc.edu/~rhk/pubs/tr2290~1734.pdf, 2002.
  • 4S Yi,R Kravets. MOCA:Mobile certificate authority for wireless ad hoc networks[C].In :Proceedings of the 2nd Annual PKI Research Workshop(PKI 03 ), http:∥mobius.cs.uiuc.edu/~seungyi/, 2003.
  • 5H Luo,P Zerfos,J Kong et al. Self-securing Ad Hoc Wireless Networks[C].In:IEEE ISCC 2002,www.cs.ucla.edu/~jkong/publications/ISCC02.pdf, 2002.
  • 6H Luo,S Lu. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks. UCLA-CSD-TR-200030,http:∥www.cs.ucla.edu/wing/publication/papers/Luo.TR200030.pdf, 2000-10.
  • 7JP Hubaux,L Buttyan,S Capkun. Self-organized Public-Key Management for Mobile Ad hoc Networks.In Transactions on Mobile Computing, http:∥icwww.epfl.ch/publications/documents/IC_TEC H_REPORT_200234.pdf,, 2003.
  • 8JP Hubaux ,L.Buttyan ,S Capkun.The Quest for Security in Mobile Ad hoc Networks. ACM 2001 ,http:∥www.gta.ufrj.br/~eric/tese/artigos/Quest ForSecurityInMobileAdhocNetworks.pdf, 2001.
  • 9S Yi,R Kravets. Composite Key Management for Ad Hoc Networks [R].Report No UIUCDCS-R-2003-2392,UILU-ENG-2003-1778,http:∥www. cs. uiuc. edu/Dienst/Repository/2.0/Body/ncstrl. uiuc_cs/IUCDCS-R-2003-2392/pdf, 2003.
  • 10A Khalili,J Katz,W A Arbaugh.Towards Secure Key Distribution in Truly Ad Hoc Networks. University of Maryland,http:∥www.gta.ufrj.br/~eric/tese/artigos/id_threshold.ps.gz.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部