期刊文献+

适用于卫星网络的IBE安全密钥分发 被引量:2

Secure Key Issuing for IBE Suitable for Satellite Networks
下载PDF
导出
摘要 分析了卫星网络的通信特点,提出一种基于身份加密体制的安全密钥分发方法,用于解决在卫星网络中基于身份加密体制的密钥托管问题。该方法将密钥生成中心的功能进行划分,并将划分后的子功能分别由不同实体完成,网络结点通过与不同实体交互计算出私钥,防止单个密钥生成中心获取网络结点的私钥。安全性分析和仿真分析表明,该方法具有良好的安全性,在卫星网络中具有较高运行效率。 The communication characteristics of satellite networks is analyzed. A new secure key issuing method based on identity based encryption (IBE) is proposed to solve the IBE key escrow problem in satellite networks. It divides the function of key generate center into parts. The divided sub-functions are completed by different entities in the system. This scheme solves the problem of key escrow and prevents the individual key generating center to acquire the private keys of network nodes. The analysis shows that the scheme can provide good security and high efficiency for space information networks.
出处 《现代电子技术》 2011年第7期74-77,共4页 Modern Electronics Technique
关键词 保密通信 卫星网络 基于身份加密体制 密钥生成中心 随机预言模型 安全密钥分发 secure communication satellite network identity based eneryption key generating center random oracle model secure key issuing
  • 相关文献

参考文献11

  • 1刘小跃,马建峰,钟焰涛,任方.空间信息网安全组网新架构[J].网络安全技术与应用,2009(6):13-15. 被引量:6
  • 2MaoWen-bo.现代密码学理论与实践[M].北京:电子工业出版社,2004:169-171.
  • 3SHAMIR A Identity-based cryptosystems and signature schemes[C]//Proceedings of the 1984 Crypto Conference.Blakley:Springer-Verlag,1984:47-53.
  • 4BENTAHAR K,FARSHIM P,LEE M,et al.Generic constructions of identity-based and certificateless KEMs[R/OL].[2005-05-083.http://eprint.iacr.org.
  • 5CHEN L,HARRISON K,SOLDERA D,et al.Applications of multiple trust authorities in pairing based cryptosysterns[C]//Proceedings of the International Conference on Infrastructure Security.USA:Springer-Verlag,2002:260-275.
  • 6GOLDBERG K I.A distributed private-key generator for identity-based cryptography[R].Waterloo:University of Waterloo,2007.
  • 7GENTRY C.Certificate-based encryption and the certificate-revocation problem[C]//Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques.Heidelberg,Berlin:Springer-Verlag,2003:272-291.
  • 8AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography[C]//Proceedings of the Ninth International Conference on the Theory and Application of Cryptology and Information Security.Taipei,China:ICTACIS,2003:452-473.
  • 9BELLARE Mihir,ROGAWAY Phillip.Random oracles are practical:a paradigm for designing efficient protocols[C]//Proceedings of the 1st ACM Conference on Computer and Communication Security.[s.I.]:ACM Press,1993:62-73.
  • 10BONEH D,FRANKLIN M.Identity based entry-ption from the weil pairing[J].SIAM Journal of Computing,2001,32,(3):586-615.

二级参考文献1

共引文献7

同被引文献12

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部