期刊文献+

一种基于第三方认证的无线组密钥协商协议

Novel group key agreement protocol based on trusted third party for wireless network
下载PDF
导出
摘要 提出一种基于第三方认证的组密钥协商协议,用于在无线Mesh网络环境下的移动用户间的协同工作。经过安全性分析和性能分析得出,新协议不仅可以对组用户提供私密性保护,而且协议参与者的身份得到认证,此外,每个成员的计算成本和通信量显著降低,提高了协议的执行效率。因此,该协议是无线Mesh网络环境下的一种新型、可靠的组密钥协商协议。 This paper proposed a novel group key agreement protocol based on trusted third party, applied in collaboration be- tween mobile users for wireless Mesh network. The security analysis and performance analysis show that, the protocol not only provides privacy protection for group members, but also authenticates all participants by adopting certificates. More important, in the proposed protocol, the computation cost and traffics for each group member are largely reduced to improve the implemen- tation efficiency of the protocol. Therefore, the protocol is a novel, reliable group key agreement protocol, and it is well suited for wireless Mesh network.
出处 《计算机应用研究》 CSCD 北大核心 2011年第1期309-311,317,共4页 Application Research of Computers
基金 国家"863"计划资助项目(Z031001) 贵州省科学技术基金资助项目(黔科合J字[2008]2125号)
关键词 组密钥协商协议 无线MESH网络 第三方认证 多线性DH问题 group key agreement wireless Mesh network trusted third party authentication multilinear Diffe-Hellman problem
  • 相关文献

参考文献10

  • 1SAEEDNIA S, SAFAVI-NAINI R.Efficient identity-based conference key distribution protocols[C]//Proc of Information Security and Privacy-Third Australasian Conference.[S.l.]:Lecture Notes in Computer Science,1998:320-331.
  • 2KIM Y, PERRIG A, SUDIK G.Tree-based group key agreement[J].ACM Trans on Information and System Security,2004,7(7):60-96.
  • 3ATENIESE G, STEINER M, TSUDIK G.New multiparty authentication services and key agreement protocols[J].IEEE Journal on Selected Areas in Communications,2000,18(4):628-640.
  • 4WU S T, CHIU J H, CHIEU B C, Identity-based key agreement for peer group communication from pairings[J].IEICE Trans on Fundamentals, 2005,E88-A(10):2762-2768.
  • 5SUN Y, TRAPPE W, LIU K J R.A scalable multicast key management scheme for heterogeneous wireless networks[J].IEEE/ACM Trans on Netw,2004,12(4):653-666.
  • 6ZHU S, SETIA S, XU S, et al.GKMPAN: an efficient group rekeying scheme for secure multicast in Ad hoc networks[C]//Proc of Mobiquitous.2004.
  • 7KAYA T, LIN G, NOUBIR G, et al.Secure multicast groups on Ad hoc networks[C]//Proc of SASN.2003.
  • 8DU W, DENG J, HAN Y, et al.A key predistribution scheme for sensor networks using deployment knowledge[J].IEEE TDSC,2006,3(1).
  • 9CHAN H, PERRIG A, SONG D, Random key predistribution schemes for sensor networks[C]//Proc of S&P.2003.
  • 10MILLER V S.Use of elliptic curves in cryptography[C]//Proc of Advances in Cryptology-CRYPTO.[S.l.]:Springer-Verlag,1986:417-26.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部