期刊文献+

Adhoc网络的多点秘密共享方案及其应用

A Multi-point Secret Sharing Scheme in Ad hoc Networks
下载PDF
导出
摘要 针对Ad hoc网络,提出了一种多点秘密共享方案。该方案基于大整数分解和离散对数计算复杂度高的数学原理,采用Deffie-Hellman密钥协商协议产生子密钥。在子密钥传输过程中,引入影子密钥,增加了攻击者恢复出子密钥的难度,有效解决了子密钥传输过程中易被窃听的问题;同时通过多个秘密分发者将密钥分配给参与者,防止了攻击者对秘密分发者的单点攻击,解决了个别秘密分发者、参与者欺骗问题,增强了方案的健壮性。对于多种攻击手段的分析表明,该方案能够有效抵御多种攻击方法,没有安全缺陷,与传统秘密共享方案的比较表明,该方案实现代价小,运算复杂度低,安全级别高。 A multi-point new secret sharing scheme was proposed for Ad hoc networks .The scheme based on the complexi-ty of difficult big integer factorization and discrete logarithm computation .The Deffie-Hellman key agreement protocol was a-dopted to create sub-key.The shadow key was introduced in the sub -key transfer process , which increased the difficulty of at-tacking.Thus the scheme can effective solve the problem of encryption of sub -key.At the same time, multi-point secret dis-tribution can prevent the attacker from single point attacking , which can ensure the robustness of the scheme .Through the analy-sis, it was found that the multi -point secret sharing scheme can better meet the needs of application with higher safety and effec -tiveness.
出处 《武汉理工大学学报(信息与管理工程版)》 CAS 2014年第5期589-591,共3页 Journal of Wuhan University of Technology:Information & Management Engineering
基金 国家"863"重大科技攻关资助项目(2012AA110601)
关键词 多点秘密共享方案 明文传输 子密钥 秘密分发者 multi-point secret sharing scheme plaintext transmission sub-key secret distributor
  • 相关文献

参考文献12

  • 1SHAMIR A. How to share a secrets [ J ]. Communica- tions of the ACM, 1979,22(11) :612 - 613.
  • 2BLAKLEY G R. Safeguarding cryptographic keys [ C ] /// Proceedings of National Computer Conference. Montvale : AFIPS Press, 1979:313 - 317.
  • 3梁小宇,刘泉,刘新华.一种基于分簇的优化定向扩散路由协议[J].武汉理工大学学报(信息与管理工程版),2011,33(4):521-524. 被引量:3
  • 4胡耀祖,肖呖,肖正安.BB84量子密钥分配方案的改进[J].武汉理工大学学报:信息与管理工程版,2011,33(4):521—524.
  • 5王海艳,王汝传.秘密共享方案的研究[J].微机发展,2005,15(3):32-34. 被引量:6
  • 6HWANG R J, CHANG C C. An on -line sharing scheme for multi -secrets [ J]. Computer Communica- tions, 1998,21 ( 3 ) : 1170 - 1176.
  • 7LAI L F, LIANG Y B, DU W L, et al. Secret sharing via noisy broadcast channels [ C ]//2011 IEEE Interna- tional Symposium on Information Theory Proceedings (ISIT). [ S. 1. ] : [ s. n. ], 2011:1955 - 1959.
  • 8MCKENNEY P E, BAUSBACHER P E. Physical - layer and link - layer modeling of packet - radio net- work performance [ J ]. IEEE Journal on Selected Are- as in Communications, 1991,9( 1 ) :59 -64.
  • 9WANG X M, DONG Y R. Threshold group signature scheme with privilege subjects based on ECC [ C ]// Communications and Intelligence Information Security (ICCIIS), 2010 International Conference. [ S. 1. ]: Is. n. ] , 2010:84 -87.
  • 10CHANGTY, HWANG M S, YANGWP. An im- provement on the Lin - Wn ( t, n) threshold verifiable multi - secret sharing scheme[ J]. Applied Mathemat- ics and Computation,2005,163 ( 1 ) : 169 - 178.

二级参考文献22

  • 1刘泉,梁小宇.一种基于被动分簇算法的能源有效WSN模型[J].计算机工程与应用,2007,43(16):142-145. 被引量:5
  • 2Al - KARAKI J N, KAMAL A E. Routing techniques in wireless sensor networks : a survey [ J ]. IEEE Wireless Comm,2004( 11 ) :6 -28.
  • 3INTANAGONWIWAT C, GOVINDAN R, ESTRIN D. Directed diffusion:a scalable and robust communication paradigm for sensor networks [ C ]//Proceedings of ACM MobiCom. Boston : MA,2000 : 56 - 67.
  • 4YI Y, GERLA M, KWON T J. Efficient flooding in ad hoc networks using on - demand (passive) cluster formation[ C ]//Proc of the 3rd ACM MobiHoc. Lausanne: [ s. n. ] ,2002:217 -225.
  • 5LIANG X Y, LIU Q . A new model and route protocol of cluster - based wireless sensor network [ J ]. Computational Intelligence and Industrial Application, 2004 (12) :28 -30.
  • 6SHELTMAI T, MOUFTAH H. A comparative study of on - demand and cluster - based routing prototols in MANETs[C]//Proceedings of IEEE IPCCC Workshop on EWCN. Arizona : [ s. n. ] ,2003 : 291 - 295.
  • 7MANJESSHWAR A, GRAWAL D P. TEEN: a protocol for enhanced efficiency in wireless sensor networks [C]//Proc of the 15th Parallel and Distributed Processing Syrup. San Francisco:IEEE Computer Society, 2001:2009 - 2015.
  • 8QIAN Y, ZHOU J F, CHEN K S. Prolonging the life- time of wireless sensor network via multihop clustering [C]//NEW2AN. [S. l. ] :[s. n. ] ,2006:118-129.
  • 9SILVA F, HEIDEMANN J, GOVINDAN R. Network routing application programmer's interface ( API ) and walk through 9.0. 1 [R ]. LOS Angeles: Information Sciences Institute, USC ,2002.
  • 10SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11) :612 -613.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部