期刊文献+

一种适用于移动自组网环境的密钥管理方案

Key management scheme for mobile Ad hoc networks
下载PDF
导出
摘要 采用具有超大规模密钥管理优势的组合公钥密码体制,结合Shamir的(t,n)门限方案思想,提出了一种适用于移动自组网环境的部分分布式密钥管理方案,给出了一种服务节点私钥矩阵份额的更新方法,并对方案的公私钥种子钥矩阵生成进行了实现。分析表明,该方案具有高的安全性、小的计算量、强的扩展性和好的实用性,适用于移动自组网环境。 This paper proposed a partly distributed key management scheme for mobile Ad hoc network(MANETS),which was combined public key(CPK) cryptography with Shamir(t,n) secret sharing scheme.Designed a method to update the private key shares of service nodes.And gave the process of generating public/private key seed matrix.Analysis shows that this project is secure,distensible,concise,practical and applicable for the characteristics of MANETS.
出处 《计算机应用研究》 CSCD 北大核心 2011年第2期701-703,707,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2008AA01Z404)
关键词 组合公钥 门限方案 种子矩阵 私钥份额 combined public key threshold scheme seed matrix private key share
  • 相关文献

参考文献11

  • 1ZHOU Li-dong, HASS Z J. Securing Ad hoc networks[J].IEEE Network Magazine, 1999,13(6):24-30.
  • 2YI S, NALDURG P, KRAVETS R. Security-aware Ad hoc routing for wireless networks, Report of UIUCDCS-R-2002-2290 [R].[S.l.] :UIUCDCS,2002.
  • 3ZHANG Yu-chen, LIU Jing, WANG Ya-di, et al. Identity-based threshold key management for Ad hoc networks[C]//Proc of PACIIA 2008. [S.l.] :IEEE Computer Society,2008:797-780.
  • 4ZHANG Yu-chen, LIU Jing, WANG Ya-di, et al.Distributed key management based on elliptic curve cryptography for mobile Ad hoc network[C]//Proc of ICCSE 2008. Xiamen:Xiamen University Press, 2008: 779-782.
  • 5张玉臣,王亚弟,刘璟,马自堂,周雁舟,李晓.Ad Hoc网络环境下分布式密钥管理[J].武汉大学学报(理学版),2009,55(1):85-88. 被引量:9
  • 6南相浩,陈化平,陈钟,李益发.组合公钥(CPK)体制标准(V3.0)[J].计算机安全,2009(11):1-2. 被引量:8
  • 7WANG G, CHAO G. Compromise-resistant pairwise key establishment for mobile Ad hoc networks[J].ETRI Journal, 2006,28(3):375-378.
  • 8成奋华,周顺先,王雷.传感器网络中基于对偶编码的随机密钥建立算法[J].计算机应用,2010,30(6):1495-1497. 被引量:4
  • 9MANZ D, ALVES-FOSS J, ZHENG Shan-yu. Network simulation of group key management protocols[J].Journal of Information Assurance and Security, 2008, 8(4):67-69.
  • 10SINGH S, RAJPAL N, SHARMA A K,et al. Policy based decentra-lized group key security for mobile Ad hoc networks[J].International Journal of Computer Science Issues, 2010, 7(3):44-49.

二级参考文献23

  • 1许俊杰,曾贵华.基于椭圆曲线的Ad hoc网络门限身份认证方案[J].计算机工程与应用,2007,43(17):117-118. 被引量:7
  • 2Zhou L, Hass Z J. Securing Ad Hoe Networks[J]. IEEE Network Magazine, 1999,13(6) :24-30.
  • 3Luo H,Zerfos P,Kong J,et al. Self-Securing Ad Hoe Wireless Network[ C ]/ / Seventh IEEE Symposium on Computers and Communications. Taormina: IEEE Press, 2002 : 567.
  • 4Fokin K. Key Management in Ad Hoc Networks[EB/ OL]. [2008-01-11 ]. http ://www. computer. org/.
  • 5Manulis M. Key Agreement for Heterogeneous Mobile Ad-Hoc Groups[C]//Proceedings of the 2005 11th International Conference on Parallel and Distributed Systems. Washington D C:IEEE Press,2005:375.
  • 6Yi S,Kravets R. Key Management for Heterogeous Ad Hoc Wireless Network[C]//10th IEEE International Conference on Network Protocols. New York: IEEE Press, 2002 : 165.
  • 7Kong J,Zerfos P,Luo H,et al. Providing Robust and Ubiquitous Security Support for Mobile Ad Hoe Networks [ C ]/ / IEEE 9th International Conference on Networks Protocol. New York: IEEE Press, 2001 : 324.
  • 8Kong J,Zerfos P, Luo H ,et al. Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks [J]. ACM Transactions on Networking ,2004,12(6) : 1049- 1063.
  • 9Shamir A. How to Share a Secrete[J]. Communications of the ACM, 1979,22(11) : 612-613.
  • 10Simmons G J. How to (Really) Share a Seerete[EB/ OL]. [2007-12-16]. http://csdl2.computer. org/.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部