期刊文献+

移动自组网分布式对密钥管理框架研究 被引量:1

Study on framework of distributed pair key management for mobile Ad hoc networks
下载PDF
导出
摘要 依托Shamir(t,n)秘密共享门限方案和椭圆曲线密码体制(ECC),给出了一个应用于移动自组网环境的部分分布式对密钥管理框架,提出了一种自适应网络规模的秘密门限值动态调整方案,在不改变系统私钥的情况下,设计了一种服务节点私钥份额更新方法。分析表明,框架具有高的安全性、强的灵活性、高的可靠性和小的计算量,有助于移动自组网的对密钥管理研究。 This paper proposed a partly distributed pair key management framework for mobile Ad hoc network(MANETS),which combined Shamir(t,n) secret sharing scheme with elliptic curve cryptography(ECC).Put a project up which could dynamically adjust the value of threshold according to scales of networks.And designed a method to update the private key shares of service nodes,which didn't need to change the private key.Analysis indicates that this framework is secure,flexible,reliable,lightweight and applicable for the characteristics of MANETS.
出处 《计算机应用研究》 CSCD 北大核心 2011年第2期711-713,共3页 Application Research of Computers
基金 国家“863”计划资助项目(2008AA01Z404)
关键词 对密钥 秘密共享 门限方案 私钥份额 pair key secret sharing threshold scheme private key share
  • 相关文献

参考文献6

  • 1ZHOU Li-dong, HASS Z J. Securing Ad hoc networks[J].IEEE Network Magazine,1999,13(6):24-30.
  • 2YI S, NALDURG P, KRAVETS R. Security-aware Ad hoc routing for wireless networks, UIUCDCS-R-2002-2290 [R].[S.l.] :UIUCDCS,2002.
  • 3ZHANG Yu-chen, LIU Jing, WANG Ya-di, et al. Identity-based threshold key management for Ad hoc networks[C]//Proc of PACIIA 2008. [S.l.] :IEEE Computer Society, 2008:797-780.
  • 4ZHANG Yu-chen, LIU Jing, WANG Ya-di, et al.Distributed key management based on elliptic curve cryptography for mobile Ad hoc network[C]//Proc of ICCSE 2008. Xiamen:Xiamen University Press,2008: 779-782.
  • 5张玉臣,王亚弟,刘璟,马自堂,周雁舟,李晓.Ad Hoc网络环境下分布式密钥管理[J].武汉大学学报(理学版),2009,55(1):85-88. 被引量:9
  • 6WANG G, CHO G. Compromise-resistant pairwise key establishment for mobile Ad hoc networks[J].ETRI Journal, 2006,28(3):375-378.

二级参考文献13

  • 1许俊杰,曾贵华.基于椭圆曲线的Ad hoc网络门限身份认证方案[J].计算机工程与应用,2007,43(17):117-118. 被引量:7
  • 2Zhou L, Hass Z J. Securing Ad Hoe Networks[J]. IEEE Network Magazine, 1999,13(6) :24-30.
  • 3Luo H,Zerfos P,Kong J,et al. Self-Securing Ad Hoe Wireless Network[ C ]/ / Seventh IEEE Symposium on Computers and Communications. Taormina: IEEE Press, 2002 : 567.
  • 4Fokin K. Key Management in Ad Hoc Networks[EB/ OL]. [2008-01-11 ]. http ://www. computer. org/.
  • 5Manulis M. Key Agreement for Heterogeneous Mobile Ad-Hoc Groups[C]//Proceedings of the 2005 11th International Conference on Parallel and Distributed Systems. Washington D C:IEEE Press,2005:375.
  • 6Yi S,Kravets R. Key Management for Heterogeous Ad Hoc Wireless Network[C]//10th IEEE International Conference on Network Protocols. New York: IEEE Press, 2002 : 165.
  • 7Kong J,Zerfos P,Luo H,et al. Providing Robust and Ubiquitous Security Support for Mobile Ad Hoe Networks [ C ]/ / IEEE 9th International Conference on Networks Protocol. New York: IEEE Press, 2001 : 324.
  • 8Kong J,Zerfos P, Luo H ,et al. Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks [J]. ACM Transactions on Networking ,2004,12(6) : 1049- 1063.
  • 9Shamir A. How to Share a Secrete[J]. Communications of the ACM, 1979,22(11) : 612-613.
  • 10Simmons G J. How to (Really) Share a Seerete[EB/ OL]. [2007-12-16]. http://csdl2.computer. org/.

共引文献8

同被引文献13

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部