期刊文献+

基于智能计量系统的会话密钥管理方案

A Research on Session Key Management in Advanced Metering Infrastructure
下载PDF
导出
摘要 分析了AMI网络结构和该结构下的安全问题。针对通信供应商提供的安全机制和DL/T698安全机制所存在的问题,本文采用属性基加密的方案解决高级量测体系中的会话密钥管理问题,能够有效解决AMI广播中需要多次加密的问题,并能保障AMI系统信息的私密性,对AMI系统建设有参考意义。 Advanced metering infrastructure brings new challenges to power grid. This paper analyzes the AMI network structure and the security issues in this structure of. In order to achieve security under the security mechanisms of Communications providers and security mechanisms of DL/T698, this paper uses attribute - based encryption solutions to address session key management issues in advanced metering infrastructure, which can solve the efficiency problem of many times encryption when primary station broadcast. The issue also protects the confidentiality of AMI. This paper can achieve a reference value to the construction of AMI.
出处 《云南电力技术》 2014年第2期53-56,共4页 Yunnan Electric Power
关键词 AMI 基于属性加密 网络结构 会话密钥管理 AMI, Attribute Based Encryption, Network structure, Session key management
  • 相关文献

参考文献6

  • 1单广玉,范晓晖,杨义先.GPRS系统的安全性分析[J].电信科学,2002,18(12):35-38. 被引量:5
  • 2余贻鑫.智能电网的技术组成和实现顺序[J].南方电网技术,2009,3(2):1-5. 被引量:193
  • 3曾梦岐,卿昱,谭平璋,杨宇,周楝淞.基于身份的加密体制研究综述[J].计算机应用研究,2010,27(1):27-31. 被引量:17
  • 4J. Bethencourt, A. Sahai, B. Waters. Chiphertext- policy at- tribute- based encryption [ C ], IEEE Symposium on Security and privacy. 2007:321 -334.
  • 5Shucheng Yu, Kui Ren, Wenjing Lou. FDAC: Toward fine - grained distributed data access control in wireless sensor networks [ J] . IEEE Transactions on Parallel and Distributed Sysems. 2011,22 (4) : 673 -686.
  • 6Doshi, Nishant, Jinwala. Constant ciphertext length in multiO - authority Ciphertext Policy Attribute Based Encryption [ C ] . Computer and Communication Technology ( ICCCT ) . 2011 : 451 - 456.

二级参考文献41

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography[ J]. IEEE Yrans on Information Theory, 1976, IT-22(6) :644-654.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes [ C]//Proc of Crypto' 84. [ S. l]. :Springer-Verlag, 1984:47-53.
  • 3TANAKA H. A realization scheme for the identity-based cryptosystem [ C]//Proc of Advances in Cryptology-Crypto' 87. [S. l. ]: SpringerVerlag, 1987:341-349.
  • 4TSUJI S, IFTOH T. An ID-based cryptosystem based on the discrete logarithm problem[J]. IEEE Journal on Selected Areas in Communication, 1989,7(4) :467-473.
  • 5BONEH D, FRANKLIN M K. Identity-based encryption from the Well pairing [ C ]//Proe of the 21st Annual International Cryptology Conference on Advances in Cryptology. London, UK : Springer-Verlag, 2001:213-229.
  • 6COCKS C. An identity based encryption scheme based on quadratic residues[ C]//Proc of International Conference on Cryptography and Coding. [ S. l. ] : Springer-Verlag, 2001:360-363.
  • 7HORWITZ J, LYNN B. Toward hierarchical identity-based encryption [C ]//Proc of Advances in Cryptology Eurocrypt' 02. [ S. l. ]: Springer-Verlag, 2002:466-481.
  • 8GENTRY C,SILVERBERG A. Hierarchical ID-based cryptography [ C ]//Proc of Advances in Cryptology-Asiacrypt ' 02. [ S. l.] : Springer-Verlag, 2002 : 548- 566.
  • 9LYNN B. Authenticated ID-based encryption cryptology [ R ]. ePrint Archive Report 2002/072. 2002.
  • 10CANETTI R, HALEVI S, KATZ J. A forward-secure public-key encryption scheme[ C ]//Proc of Advances in Crptology-Eurocrypt' 03. [ S. l. ] : Springer-Verlag, 2003 : 255-271.

共引文献212

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部