期刊文献+

Merkle树遍历机制的改进及应用研究

Research of traverse and application of Merkle authenticationtree
下载PDF
导出
摘要 无线Mesh网络的网络结构导致了无线Mesh网络具有更多的安全隐患。其中数据完整性校验是保障无线Mesh网络通信安全的一个重要方面,而Merkle可信树适用于批量数据验证。研究无线Mesh网络的安全特点,并研究Merkle可信树数字签名技术。研究表明,在Merkle可信树应用中,遍历可信树计算认证路径节点值需要消耗大量的时间。Merkle可信树的遍历算法的效率是影响Merkle可信树数字签名的关键。在研究的基础上,提出了一种改进的Merkle可信树遍历算法,并将改进后的Merkle可信树应用于无线Mesh网络的数据完整性校验机制。 The structure of wireless Mesh network has led to more security risks,and data integrity check is an important aspect to protect the security of the wireless Mesh network.Merkle authentication tree is used to authenticate bulk data.Security in wireless Mesh network and Merkle authentication signature technology is researched.Studies show that calculating authentication path consumes a lot of time in Merkle tree,Merkle traversal algorithm affects the efficiency of Merkle authentication tree signature.Based on the study,a modified Merkle tree traversal algorithm is proposed and the new traversal algorithm is used in data integrity check mechanism in wireless Mesh network.
出处 《计算机工程与应用》 CSCD 2012年第14期98-101,167,共5页 Computer Engineering and Applications
关键词 Merkle可信树 无线MESH网络 数据完整性验证 遍历 时间性能 Merkle authentication-tree wireless Mesh network data integrity check traversal time property
  • 相关文献

参考文献11

  • 1Merkle R C.A certified digital signature[C]//Proc Advances in Cryptology (Crypto' 89), Berlin: Springer-Verlag, 1989: 218-238.
  • 2Rivest R L, Shamir A,Adleman L.A method for obtain- ing digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21(2) : 120-126.
  • 3Elgamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[C]//LNCS 196:Ad- vances in Cryptology CRYPTO' 84,1985:10-18.
  • 4Johnson D,Menezes A.The Elliptic Curve Digital Signa- ture Algorithm(ECDSA),Technical Report CORR 99-34[R]. University of Waterloo, 1999.
  • 5Jakobsson M, Leighton T, Micali S, et al.Fractal Merkle tree representation and traversal[C]//LNCS 2612: Proc Cryptographer' s Track at RSA Conference(CT-RSA' 03). Berlin: Springer-Verlag, 2003 : 314-326.
  • 6Berman P, Karpinski M,Nekrich Y.Optimal trade-off for Merkle tree Traversal[J].Theoretical Computer Science, 2007,372(1).
  • 7Szydlo M.Merkle tree traversal in log space and time[EB/ OL].http://www.szydlo.com/.
  • 8S,zydlo M.Merkle tree traversal in log space and time[C]// LNCS 3027: Proc Eurocrypt, 2004: 541-554.
  • 9Coronado Garcia L C.On the security and the efficiency of the Merkle signature scheme[EB/OL]. (2005).http:// eprint.iacr.org/.
  • 10方旭明.下一代无线因特网技术,无线Mesh网[M].北京:人民邮电出版社,2004:10-12.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部