期刊文献+

一种基于身份的可追责传感器网络加密方案 被引量:1

An identity-based accountable authority encryption in wireless sensor network
下载PDF
导出
摘要 为解决无线传感器网络基于身份加密的密钥托管问题,分析了目前比较流行的无证书和基于证书等密钥托管解决方案的特点。综合考虑能量消耗、密钥分发的追责以及抗选择密文攻击安全等因素,提出了一种自适应选择身份模型下抗选择密文攻击(IND-ID-CCA)安全的可追责的基于身份加密方案。该方案将基于身份加密和密钥分发跟踪相结合,采用k重复加密算法和一次性强不可伪造签名方案,达到了IND-ID-CCA安全。不使用随机预言给出了方案的安全证明。与无证书和基于证书的密钥协商方案进行对比仿真实验和性能分析,表明本方案以较少的能耗通过权力追责的方式减少了对密钥分发机构的信任,从而降低了恶意密钥分发造成的破坏。 To deal with the problem of key escrow of identity-based encryption problem in wireless sensor network , the characteristics of current popular key escrow solution are analyzed, such as certificateless, certificate-based and so on. Considering the energy consumption, accountable key distribution, CCA and other factors, this paper proposes an IND-ID-CCA secure accountable authority identity-based encryption (A-IBE). Based on the identity-based encryption and key distribution tracking, the scheme combines k-repetition encryption algorithm and one-time strong unforgeability signature scheme so as to reach IND-ID-CCA security. The security proof without random oracles is given. Compared with the certificateless and certificate-based key agreement schemes through simulation and analysis, the results show that the proposed scheme reduces the amount of trust in authorities in identity-based encryption through the accountable authority as a tool, thus decreasing damage of the malicious key distribution caused by dishonest private key generation with less energy consumption.
作者 王大鹏
出处 《微型机与应用》 2014年第9期48-52,共5页 Microcomputer & Its Applications
基金 国家自然科学基金项目(10771092) 辽宁省教育厅基金项目(L2011186)
关键词 基于身份密码学 无线传感器网络 可追责 抗选择密文攻击安全 identity-based cryptography wireless sensor network accountable authority CCA
  • 相关文献

参考文献15

  • 1JENNIFER Y, BISWANATH M, DIPAK G. Wireless sensor network survey[J]. Computer Networks, 2008,52(12):2292-2330.
  • 2BONEH D, FRANKIJN M. Identity based encryption from the Well Pairing [J]. SIAM Journal of Computing, 2003, 32 (3) : 586-615.
  • 3REN K, YU S, LOU W, ZHANG Y. PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(2): 203-215.
  • 4REN K, YU S, LOU W, ZHANG Y. PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wire'tess mesh networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(2): 203-215.
  • 5HARN L, REN J. Generalized digital certificate for user authentication and key establishment for secure communica- tions[J]. IEEE Transactions on Wireless Communications, 2011, 10(7) :2372-2379.
  • 6HOLBL M, WELZER T, BRUME B. An improved two- party identity-based authenticated key agreement protocol using pairings[J]. Journal of Computer and System Sciences, 2012, 78(1): 142-150.
  • 7CHOI, K Y, PARK J H, LEE D It. A new provably secure certificateless short signature scheme[J]. Computers & Mathematics with Applications, 2011,61 (7) : 1760-1788.
  • 8SHIM K. On the security of a certificateless aggregate signature scheme[J]. IEEE Communications Letters, 2011,15 (10) : 1136-1138.
  • 9LIBERT B, VERGNAUD D. Towards practical black-box accountable authority IBE: weak black-box traceability with short ciphertexts and private keys[J]. IEEE Transactions on Information Theory, 2011, 57(10): 7189-7204.
  • 10DOTFLING N, DOWSLEY R, MULLER -QUADE J. Nascimento, A C & A CCA2 secure variant of the McEliece cryptosystem[J]. IEEE Transactions on Information Theory, 2012, 58(10): 6672-6680.

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部