期刊文献+

ad hoc网络具有撤销机制的密钥管理方案

Key management scheme with key revocation for ad hoc networks
下载PDF
导出
摘要 分析了现有ad hoc网络基于身份的密钥管理方案,针对用户密钥泄漏,异常等情况,提出了一种具有密钥撤销机制的密钥管理方案,并在此基础上给出了用户签名方案。在文本中,用户可以通过注销泄漏密钥,防止攻击者用窃取的密钥伪造用户签名,即使攻击者成功伪造了用户签名,用户还可以通过系统签名注销消息来证明伪造的签名无效。方案在门限密码学的基础上以完全分布化方式建立系统密钥,具有良好的容错性,能抵御网络的主动和被动攻击。和以往的方案相比具有更高的安全性。 This paper analyzes the identity-based key management schemes for ad hoc networks.A key management scheme with key revocation is proposed for key-exposure,abnormality etc.,and a signature scheme is constructed based on this key management scheme.The scheme can prevent message from being forged using the stolen key through revoking the leaked key.Even if the attacker forges the user signature successfully,the user can prove it is invalid by system signature of the revocation message.The system private key is constructed with the distributed generation based on the threshold cryptography in the scheme.It has fault tolerance and can resist the active and passive attacks.Compared with the previous scheme it is more secure.
作者 孙梅 张娟
出处 《计算机工程与应用》 CSCD 2013年第18期94-98,共5页 Computer Engineering and Applications
基金 安徽省高等学校省级自然科学研究项目(No.KJ2010B190 No.KJ2012B157) 安徽省自然科学基金(No.1208085MF108)
关键词 AD HOC网络 基于身份 密钥泄漏 密钥撤销 ad hoc networks identity-based key-exposure key revocation
  • 相关文献

参考文献12

  • 1Zhou L,Hass Z J.Securing ad hoc networks[J].IEEE Network,1999,13(6):24-30.
  • 2Luo H,Zefros P,Kong J,et al.Self-securing ad hoc wireless networks[C]//Proceedings of the Seventh IEEE Symposium on Computers and Communications(ISCC’02).Taormina:IEEE Press,2002:548-555.
  • 3Kong J,Zefros P,Luo H,et al.Providing robust and ubiquitous security support for mobile ad-hoc networks[C]//Proceedings of 9th International Conference on Network Protocols(ICNP’01).Riverside,CA:IEEE Press,2001:251-260.
  • 4Luo H,Kong J,Zerfos P,et al.Ubiquitous and robust access control for mobile ad hoc networks[J].ACM Transactions onNetworking,2004,12(6):1049-1063.
  • 5Khalili A,Katz J,Arbaugh W A.Toward secure key distribution in truly ad-hoc networks[C]//Proceedings of the Symposium on Applications and the Internet Workshops(SAINT’03).Orlando,FL,USA:IEEE Press,2003:342-346.
  • 6Boneh D,Franklin M K.Identity-based encryption from the Weil pairing[J].SIAM Journal of Computing,2003,32(3):586-615.
  • 7Deng H,Mukherjee A,Agrawal D P.Threshold and identitybased key management and authentication for wireless ad hoc networks[C]//The International Conference on Information Technology:Coding and Computing(ITCC’04).Las Vegas,USA:IEEE Press,2004:107-110.
  • 8杜春来,胡铭曾,张宏莉.在椭圆曲线域中基于身份认证的移动ad hoc密钥管理框架[J].通信学报,2007,28(12):53-59. 被引量:20
  • 9李慧贤,庞辽军,王育民.适合ad hoc网络无需安全信道的密钥管理方案[J].通信学报,2010,31(1):112-117. 被引量:18
  • 10Hess F.Efficient identity based signature schemes based on pairings[C]//LNCS 2595:Selected Areas in Cryptography(SAC 2002).Berlin:Springer-Verlag,2003:310-324.

二级参考文献19

  • 1庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 2ZHOU L D, HASS Z J. Securing ad hoc networks[J]. IEEE Network, Special Issue on Network Security, 1999, 13(6): 24-30.
  • 3DA SILVA E, DOS SANTOS A, ALBINI L C E et al. Identity-based key management in mobile ad hoc networks: techniques and applications[J]. IEEE Wireless Communications, 2008, 15(5): 46-52.
  • 4LUO H, ZEFROS P, KONG J, et al. Self-securing ad hoc wireless networks[A]. Proceeding of the Seventh IEEE Symposium on Computers and Communications (ISCC'02)[C]. Taormina, Italy, 2002. 548-555.
  • 5KHALILI A, KATZ J. Toward secure key distribution in truly Ad-Hoc networks[A]. Proceedings of the Symposium on Applications and the Internet Workshops (SAINT03)[C]. Orlando, FL, USA, 2003. 342-346.
  • 6BONEH D, FRANKLIN M K. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
  • 7DENG H, MUKHERJEE A, AGRAWAL D E Threshold and identity-based key management and authentication for wireless ad hoe networks[A]. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)[C]. Las Vegas, USA, 2004. 107-110.
  • 8SUI A, CHOW S, HUI L, et al. Separable and anonymous identity-based key issuing without secure channel[A]. Proceedings of the 1st International Workshop on Security in Networks and Distributed Systems (SNDS'05)[C]. Fukuoka, Japan, 2005. 275-279.
  • 9KWON S, LEE S H. Identity-based key issuing without secure channel in a broad area[A]. Proceedings of the 7th International Workshop on Information Security Applications (WISA'06)[C]. Jeju Island, Korea, 2006. 30-44.
  • 10BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing[J]. J Cryptology, 2004, 17(4): 297-319.

共引文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部