期刊文献+

基于身份和门限秘密共享的密钥管理方案

Key Management Scheme Based on Identity and Threshold Secret Sharing
下载PDF
导出
摘要 提出一种适用于无线Mesh网络的基于身份和门限秘密共享的密钥管理方案。该方案采用门限秘密共享技术实现系统私钥的分布式生成和传输,无需公钥证书的参与,只需在离线可信任机构处进行注册,将用户身份标识作为公钥,从而降低用户终端的存储和计算代价,并且可实现系统和用户私钥的周期性更新。分析结果表明,该方案安全性高、实用性强。 This paper presents key management scheme based on identity and threshold secret sharing which is applies to Wireless Mesh Network(WMN).It uses threshold secret sharing to realize the system private key distributed generation,without the participation of the public key certificate,just registers on offline of Certificate Authority(CA),gets the user identity as a public key,which greatly reduces the user end computing and storage capacity needs,realizes the system and user private key of the periodic update.Analysis results show that the scheme has high safety and strong practical.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第17期111-112,115,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60842006) 陕西省自然科学基金资助项目(2010JM8034) 武警工程学院基础研究基金资助项目(wjy201122)
关键词 无线MESH网络 密钥管理 基于身份的密码体制 门限秘密共享 Wireless Mesh Network(WMN) key management identity-based cryptosystem threshold secret sharing
  • 相关文献

参考文献7

  • 1Akyildiz L F, Wang Xudong, Wang Weilin. Wireless Mesh Networks: A Survey[J]. Computer Networks, 2005, 47(4): 445- 487.
  • 2黄东平,王华勇,黄连生,戴一奇.动态门限秘密共享方案[J].清华大学学报(自然科学版),2006,46(1):102-105. 被引量:21
  • 3Pedersen T. A Threshold Cryptosystem Without a Trusted Party[C]// Proc. of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques. Berlin, Germany: Springer-Verlag, 1991: 522-526.
  • 4Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 5Okamoto T, Pointcheval D. The Gap-problems: A New Class of Problems for the Security of Cryptographic Schemes[C]//Proc. of Public Key Cryptography Conference. Berlin, Germany: Springer- Verlag, 2001.
  • 6Shamir A. Identity-based Cryptosystems and Signature Sche- mes[C]//Proc. of International Cryptology Conference. Berlin, Germany: Springer-Verlag, 1985: 47-53.
  • 7李光松,韩文报.基于签密的Ad Hoc网络密钥管理[J].计算机工程与应用,2005,41(12):160-164. 被引量:7

二级参考文献27

  • 1Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2Blakley G R.Safeguarding cryptographic keys[A].Proceedings of National Computer Conference[C].Montvale,NJ:AFIPS Press,1979.313-317.
  • 3Ito M,Saito A,Nishizeki T.Secret sharing scheme realizing general access structure[A].Proceedings IEEE Globecom'87[C].Tokyo,Japan:IEEE Press,1987.99-102.
  • 4Cachin C.On-line secret sharing[A].Proceedings of the 5th IMA Conference on Cryptography and Coding[C].London,UK:Springer-Verlag,1995.190-198.
  • 5Hwang Ren-Junn,Chang Chin-Chen.An on-line secret sharing scheme for multi-secrets[J].Computer Communications,1998,21(13):1170-1176.
  • 6Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public key cryptosystem[J].Communication of ACM,1978,21:120-126.
  • 7Aho A,Hopcroft J,Ullman J.The Design and Analysis of Computer Algorithms[M].Massachusetts,US:Addison-Wesley,1974.
  • 8L Zhou,Z J Haas.Securing Ad hoc Networks[J].IEEE Networks,1999; 13(6) :24~30.
  • 9Y Desmedt. Threshold cryptography[J].European Transactions on Telecommunications, 1994; 5 (4): 449~457.
  • 10S Yi,R Kravets. Key Management for Heterogeneous Ad Hoc Wireless Networks[R].Department of Computer Science,University of Illinois,Urbana-Champaign,Technical Report UIUCDCS-R-2002-2290,2002;Poster Presentation, 10th IEEE International Conference on Network Protocols(ICNP 2002),www-sal.cs.uiuc.edu/~rhk/pubs/tr2290~1734.pdf, 2002.

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部