期刊文献+

无线自组织网络中一个组匿名通信方案 被引量:1

Group-based Anonymous communication Scheme for Wireless Ad Hoc
下载PDF
导出
摘要 为了满足Ad Hoc网络的一些应用场合对身份匿名的要求,如自组匿名电子选举、自组匿名民主评议委员会等,提出一个身份匿名方案。首先,要匿名通信的节点组建一个通信组,再用它们的真实身份协商出一个秘密组密钥和组参数。然后,根据协商出来的秘密组参数各自生成自己的组内可认证的组身份,最后以该组内身份进行组内通信。同时给出了组更新和组内身份匿名撤销的方案,并对整个方案进行了安全性和匿名性分析。 This paper is to offer a new scheme of identity anonymity accordance with the need of identity privacy under certain circumstances, such as anonymous E - vote, anonymous E - commerce, anonymous E - auction, anonymous conference and so on. First, the key and parameter of a communication group of anonymous i- dentities are required on the basis of forming a secret group with their real identities under consultation; then, the approvable identities within this group wilt be created automatically according to the parameter; and thus, mem- bers of this group can communicated with each other anonymously. In this paper, the update in group, the revoca- tion of identity, the safety and the anonymity of this plan are also provided.
作者 陈泗盛 许力
出处 《绵阳师范学院学报》 2011年第5期83-87,共5页 Journal of Mianyang Teachers' College
关键词 身份匿名 组通信 匿名通信 自组网 Identity anonymity group communication anonymous communication ad hoc network.
  • 相关文献

参考文献10

  • 1I. Blake (Editor). Advances in Elliptic Curve Cryptography[ J]. Number 317 in Mathematical Society Lecture Note Series, Cam- bridge University Press, 2005.
  • 2D. Boneh and M. Franklin. Identify- based Enc:ryption From the Weil Pairing. [ C] In Proc. CRYPTO01, Springer- Verlag, 2001 : 213 -219.
  • 3Y. Mu, F.G. zhamg, and W. Susilo. Secure and Anonymous Mobile Ad - Hoc Networks[C]. 2005 IEEE 7th Malaysia Inter- national Conference on Communication and the 13th IEEE International Conference on Networks, 2005:16 - 18.
  • 4Y. C Zhang, W. Liu, W. J Lou, et al. AC - PKI : Anonymous and Certifieateless Public - Key Infrastructure for Mobile Ad Hoc Networks[ C]. 2005 IEEE international conference on communication, IEEE - Press, 2005:3515 - 3519.
  • 5章洋,范植华.移动自组网络中相邻节点间通信的匿名安全[J].信息网络安全,2005(9):75-76. 被引量:1
  • 6A. shamir.. Identity- Based Cryptosystems and .~ignature Scheme[ C]. Advance in Cryptology CRYPT084, [C] 196, Spinger - verlag, 1984 : 47 - 53.
  • 7D. Boneh and M. Franklin. Identity- based Encryption From the Weil Pairing[C]. Advance in Cr)79tology- CRYPT02001, LNCS 2139, Spinger - verlag, 2001 : 213 -229.
  • 8D. Boneh, B. Lynn and H. Shacham. Short Signatures From the Well Pairing[C]. In Proceedings of the Asia -crypt 2001, vol- ume 2248 of LNCS, 2001:514 -532.
  • 9D. Augot, R. Bhaskar, et al. An efficient Group Key Agreement Protocol for Ad Hoc Networks[C]. Proceeding oflEEE Work- shop on Trust, Security alut Privacy in Ubiquitous Complzting , Taormina, Italy, 2005 : 576 - 780.
  • 10M. Manulis and J. Schwenk. Pseudonym Generation Scheme for Ad - Hoc Group Communication based on IDH [ J ]. Lecture Notes in Computer Science, Springer - Verlag 2005,3313 : 107 - 124.

同被引文献1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部