期刊文献+

大规模延迟容忍网络中基于分级身份签名的认证方案研究 被引量:3

An Authentication Scheme Using Hierarchical Identity Based Signature in Large-scale Delay Tolerant Networks
下载PDF
导出
摘要 针对大规模延迟容忍网络中现有认证方案存在通信与计算开销大问题,该文提出适用于大规模延迟容忍网络的高效认证方案。首先设计一种分级身份签名算法,在现有同类算法中计算和通信开销最小,并且具有聚合验签功能。基于该算法设计双向认证方案,并利用聚合验签功能实现并发认证,降低认证开销。基于h-wDBDHI*与ECDDH难题证明了签名算法及方案的安全性。分析与仿真实验表明,该方案的认证开销及认证成功率优于现有方案,更适合在大规模延迟容忍网络中应用。 The existing authentication schemes have the problem of heave calculation and communication overhead in the large-scale delay tolerant network. This paper proposes an authentication scheme for large-scale delay tolerant networks. An efficient hierarchical identity based signature is proposed, which has less overhead compared with the existing schemes and has the aggregate verification property. Based on the proposed signature, an authentication scheme is constructed. A batch authentication is also proposed based on the aggregate verification properties of the signature. The signature and scheme prove to be secure under the h-wDBDHI* and ECDDH assumption. The analysis and simulation show that the authentication overhead and successful rate of this scheme are both better than the existing schemes. The scheme is more suitable for the large-scale delay tolerant networks.
出处 《电子与信息学报》 EI CSCD 北大核心 2013年第11期2615-2622,共8页 Journal of Electronics & Information Technology
基金 国家973计划项目(2011CB311801) 河南省科技创新人才计划(114200510001)资助课题
关键词 延迟容忍网络 认证机制 分级身份签名算法 聚合签名 Delay Tolerant Network (DTN) Authentication scheme Hierarchical identity based signature Aggregate signature
  • 相关文献

参考文献16

  • 1Caini C, Cruickshank H, and Farrell S. Delay and disruption tolerant networking (DTN): an alternative solution for future satellite networking applications[J]. Proceedings of the IEEE, 2011, 99(11): 1980-1997.
  • 2吴亚辉,邓苏,黄宏斌.延迟容忍网络状态感知的路由策略研究[J].电子与信息学报,2011,33(3):575-579. 被引量:7
  • 3Shahbazi S, Karunasekera S, and Harwood A. Improving performance in delay/disruption tolerant networks through passive relay points].I]. Wireless Networks, 2012, 18(1): 9-31.
  • 4Seth A and Keshav S. Practical security for disconnected nodes[C]. Proceedings of the First International Conference on Secure Network Protocols, Boston, USA, 2005: 31-36.
  • 5Kate A, Gregory M Z, and Hengartner U. Anonymity and security in delay tolerant networks[C]. Security and Privacy in Communications Networks and the Workshops, CA,USA, 2007: 504-513.
  • 6Fida M R, Ali M, Adnan A, et al. Region-based security architecture for DTN[C]. Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations, Las Vegas, USA, 2011: 387-392.
  • 7Chatterjee Sand Sarkar P. New constructions of constant size ciphertext HIBE without random oracle[C]. Information Security and Cryptology, Busan, Korea, 2006: 310-327.
  • 8Boneh D and Boyen X. Secure identity based encryption without random oracles[C]. Advances in Cryptology?CRYPTO 2004, Santa Barbara, USA, 2004: 443-459.
  • 9Ferrara A L, Green M, Hohenberger S, et al . Practical short signature batch verification[C]. Topics in Cryptology -The Cryptographers' Track at the RSA Conference, San Francisco, USA, 2009: 309-324.
  • 10姜奇,马建峰,李光松,刘宏月.基于身份的异构无线网络匿名漫游协议[J].通信学报,2010,31(10):138-145. 被引量:9

二级参考文献58

  • 1朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18. 被引量:13
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85. 被引量:26
  • 4李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 5JIANG Y X, LIN C, SHEN X M. Mutual authentication and key exchange protocols for roaming services in wireless mobile networks [J]. IEEE Transactions on Wireless Communications, 2006, 5(9):2569- 2577.
  • 6YANG G M, WONG D S, DENG X T. Anonymous and authenticated key exchange for roaming networks [J]. IEEE Transactions on Wireless Communications, 2007, 6(9):1035-1042.
  • 7YANG G M, WONG D S, DENG X T. Formal security definition and efficient construction for roaming with a privacy-preserving extension[J]. Journal of Universal Computer Science, 2008, 14(3): 441-462.
  • 8SHIM H, RUTAGEMWA H, SHEN X M. A service-agent-based roaming architecture for WLAN/cellular integrated networks[J]. IEEE Transactions on Vehicular Technology, 2007, 56(5):3168-3181.
  • 9JIANG J, HE C, and JIANG L. On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access[A]. Proc International Conference on Commu- nications, Networking and Mobile Computing (ICCNMC 05)[C]. Sptinger-Verlag, 2005.972-981.
  • 10WAN Z, REN K, PRENEET B. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks[A]. Proceedings of the First ACM Conference on Wireless Network Security (ACM WiSec 2008)[C]. Alexandria, Virginia, USA, 2008.62-67.

共引文献27

同被引文献26

  • 1SHAMIR Adi. Identity-Based Cryptosystems and Signa- ture Schemes [ C ]// Advances in Cryptology-CRYPTO' 84, LNCS ( 196 ). Berlin Heidelberg : Springer- Verlag , 1985:213-229.
  • 2BONEH Dan, FRANKLIN Matt. Identity-Based Encryp- tion from the Well Pairing[ C]//Advances in Cryptology Crypto 2001, LNCS(2139). Berlin Heidelberg: Springer- Verlag,2001:213-229.
  • 3BONEH Dan, BOYEN Xavier. Efficient Selective Identity- Based Enerypfion without Random Oracles [ C ]//Advances in Cryptology- EUROCRYPT 2004, LNCS (3027). Berlin Heidelberg: Springer -Verlag,2004:223 -238.
  • 4WATERS Brent. Efficient Selective Identity-Based En- cryption without Random Oracles [ C ]//Advances in Cryptology- EUROCRYPT 2005, LNCS (3494). Berlin Heidelberg : Springer -Verlag, 2005 : 114-127.
  • 5SAHAI Amit, WATERS Brent. Fuzzy Identity-Based En- cryption [ C ]//Advances in Cryptology - EUROCRYPT 2005, LNCS ( 3494 ). Berlin Heidelberg: Springer - Ver- lag, 2005:457-473.
  • 6GALINDO David. Chosen-Ciphertext Secure Identity- Based Encryption from Computational Bilinear Diffie-Hellman Pairing [ C ]//Pairing - Based Cryptography - Pairing 2010, LNCS ( 6487 ). Berlin Heidelberg : Springer - Verlag , 2010 : 367 - 376.
  • 7HORW1TZ Jeremy, LYNN Ben. Toward Hierarchical I- dentity Based Encryption [ J ]. EUROCRYPT: 2002, LNCS(2332) :466-481.
  • 8GENTRY Graig, HALEVI Shai. Hierarchical Identity Based Encryption with Polynomially Many Levels [ C ]// TCC 2009, LNCS ( 5444 ). Berlin Heidelberg: Springer- Verlag. 2009:437-456.
  • 9BONEH Dan, BOYEN Xavier. Short Signatures without Random Oraeles[ C ]//Advanees in Cryptology-EURO- CRYPT 2004, LNCS ( 3027 ). Berlin Heidelberg: Springer-Verlag, 2004:56-73.
  • 10ZHOU Cai-xue, WAN Zhou, XI Wei-dong. Provable Certifieateless Generalized Signeryption Scheme Designs [ C ]//Codes and Cryptography ,71 ( 2 ). Berlin Heidel- berg: Springer-Verlag, 2014:331-346.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部