期刊文献+

一种基于签密算法的临近空间通信链路密钥更新方案

A Key Update Method of Near Space Communication Link Based on Signcryption Algorithm
下载PDF
导出
摘要 针对临近空间信息系统覆盖范围广、平台相对静止从而导致的信息易被监听、截获甚至篡改的问题,提出一种基于签密技术的临近空间链路的通信密钥更新方案,并从正确性、机密性和抗中间人攻击三个方面对方案进行分析,论证了该方案能够确保临近空间信息传输的机密性和完整性。 Aimed at the problem of information can be easily monitored, intercepted and cap- tured, even tampered with because of the wide coverage area and the platform relatively motion- less of near space information system, a communication key update method of near space link based on signcryption technique is proposed in this paper, the method is analyzed from three as- pects of correctness, confidentiality and anti-attack of intermediary, and it is proved that the method can insure the confidentiality and integrity of near space information transmission.
作者 吴耀光 戴静
出处 《电子对抗》 2015年第4期39-42,47,共5页 Electronic Warfare
关键词 临近空间 通信链路 签密技术 near space communication link signcryption technique
  • 相关文献

参考文献8

  • 1JANISON L, SOMMER G S, PORCHE I R. High-alti- tude Airships for the Future Force Army[ R]. Rand Corpora- tion, Santa Monica, CA, Technical Report (TR--234), 2005 : 1-46.
  • 2程月波,金荣洪,耿军平,刘波.平流层通信系统的收发链路性能研究[J].电波科学学报,2005,20(5):666-670. 被引量:6
  • 3DAHN, JPARK, BKU, etal.. Status of Technology De- velopment for HAPS in Korea [ M ]. 2003 Stratospheric Plat- form System Workshop, Tokyo, Japan, 2003:60-68.
  • 4吴佑寿.高空平台信息系统——新一代无线通信体系(下)[J].中国无线电管理,2003(7):3-11. 被引量:6
  • 5Y. Zheng. Digital signcryption or how to achieve cost (signature&encryption) <<cost (signature) + cost ( encryp- tion) [ C ]//Advances in Cryptology- CRYPTO' 97. LNCS1294, Berlin : Springer-Verlag, 1997 : 165-179.
  • 6Yuliang Zheng. Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite [ C ]// Proceedings of 2001 International Workshop on Practice and Theory in Public Key Cryptography (PKC2001). Chejo, Ko- rea, LNCS, Vol. 1992, Springer-Verlag, 2001:48-63.
  • 7B. Libert, J. J. Quisquater. A new identity based sign- cryption schemes from pairings [ C ]//2003 IEEE Information Theory Workshop. Paris, France, 2003 : 155 - 158.
  • 8柏骏,张串绒,崔晓臣.基于多接收者签密算法的门限密钥更新协议[J].计算机应用,2011,31(2):507-510. 被引量:3

二级参考文献23

  • 1金荣洪,耿军平,江冉,范瑜.倾斜天线蜂窝系统的双向信道优化模型[J].电波科学学报,2004,19(5):596-602. 被引量:2
  • 2李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 3ZHENG Y L . Digital signcryption or how to achieve cost (signature&encryption) <cost(signature) + cost(encryption) [ EB/ OL]. [ 2010 - 05 - 10]. http://citeseerx. ist. psu. edu/viewdoc/ download?doi = 10.1.1. 109. 7036&rep = repl &type = pdf.
  • 4ZHENG Y. Signcryption and its application in efficient public key solutions [ C] // ISW'97: Information Security Workshop. Berlin: Springer-Verlag, 1997:291 -312.
  • 5MALONE-LEE J. Identity based signcryption [EB/OL]. [ 2010 - 05 - 10]. http://eprint. iacr. org/2002/098.
  • 6CHEN L, MALONE-LEE J. hnproved identity-based signcryption [ M]. Berlin: Springer-Verlag, 2005:362 - 379.
  • 7LIBERT B, QUISQUATER J J. A new identity based signcryption schemes from pairings [C]// IEEE Information Theory Workshop. Washington, DC: IEEE Compnter Society, 2003:155 - 158.
  • 8LI FAGEN, HU YUPU, ZHANG CHUANRONG. An identity-based signcryption scheme for multi-domain Ad Hoc networks[ C]// Applied Crytography and Network Security, LNCS 4521. Berlin: Springer-Verlag, 2007:373 -384.
  • 9KIM H, SONG J, YOON H. A practical approach of ID-based cryp- to-system in Ad Hoc networks[J]. Wirelass Communications and Mobile Computing, 2007, 7(7) : 909 - 917.
  • 10DENG H, AGRAWAL D P. TIDS: Threshold and identity-based security scheme for wireless Ad Hoc networks[J]. Ad Hoc Networks, 2004, 2(3): 291-307.

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部