期刊文献+

适用于WSN的DV签名和密钥协商机制 被引量:3

Designated verifier signature scheme and key agreement mechanism in WSN
下载PDF
导出
摘要 为解决无线传感器网络(WSN)资源受限的问题,基于椭圆曲线数字签名算法(ECDSA),提出一个适用于WSN的指定验证者(DV)签名方案(DV-ECDSA),使只有指定的节点才能验证消息的有效性和正确性,保护信息发送节点的隐私。采用分叉定理,证明DV-ECDSA方案的安全性。基于ECDSA和DV-ECDSA,提出一种能在任意两个节点间建立共享密钥的密钥协商机制,采用数字签名思想分析机制的安全性。与现有的同类方案比较结果表明,该方案具有接近于ECDSA的优越性能,能满足能量、计算能力有限的WSN环境。 To solve the problem of limited resource in WSN,based on elliptic curve digital signature algorithm(ECDSA),a designated verifier(DV)signature scheme(DV-ECDSA)that was suitable for wireless sensor networks(WSN)was proposed.Only the designated node could verify the validity and correctness of the received message,which protected the privacy of the node that sent the message.The security of DV-ECDSA was verified using forking theorem.Based on ECDSA and DV-ECDSA,a key agreement mechanism was proposed which could establish a shared key between any two nodes,and the security of the mechanism was analyzed using the digital signature.Results of comparison analysis show that the performances of the proposed scheme are superior as that of ECDSA,and it can meet requirements of the WSN environment in which energy computing power and etc.are limited.
出处 《计算机工程与设计》 北大核心 2017年第10期2660-2664,2677,共6页 Computer Engineering and Design
基金 上海市教育委员会科研创新基金重点项目(14ZZ167) 国家自然科学基金项目(61103213 61272036 61672022) 上海第二工业大学校级重点学科计算机科学与技术基金项目(XXKZD1604)
关键词 密码学 椭圆曲线密码 密钥协商 无线传感器网络 指定验证者签名 cryptography elliptic curve cryptography key agreement wireless sensor networks designated verifier signature
  • 相关文献

参考文献6

二级参考文献69

  • 1刘广聪,陈平华,胡志斌.一种基于能量感知的无线传感器网络混合路由协议[J].传感器与微系统,2012,31(6):25-28. 被引量:2
  • 2YANG Geng,RONG Chun-ming,VEIGNER Christian,WANG Jiang-tao,CHENG Hong-bing.Identity-based key agreement and encryption for wireless sensor networks[J].The Journal of China Universities of Posts and Telecommunications,2006,13(4):54-60. 被引量:10
  • 3苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 4JAKOBSSON M, SAKO R.IMPAGLIAZZO R, Designatured verifier proofs and their applications[C]//Proc of Advances in Eurocrypt.LNCS, 1070.[S.l.] Springer-Verlag,1996:143-154.
  • 5SAEEDNIA M, KRAMER S, MARKOVITCH O.An efficient strong designated verifier scheme[C]//Proc of ICISC.[S.l.]:Springer-Verlag,2003:40-54.
  • 6BONEH D, LYNN B, SHACHAM H.Short signatures from the weil pairings[C]//Proc of Advances in Cryptology-Asiacrypt’01, LNCS, 2248.[S.l.]:Springer-Verlag.2001:514-532.
  • 7HUANG X, SUSILO W, MU Y, et al.Short designated verifier signature scheme and its identity-based variant[J].International Journal of Network Security,2008,6(1):82-93.
  • 8Al-Riyami Sattam S, Paterson Kenneth G. Certifi- cateless public key cryptography[C] // Advance in Cryptography- ASIACRY PT 2003, Berlin: Spring- er-Verlag, 2003.
  • 9Paterson K G, Schuldt J C N. Efficient identity- based signatures secure in standard model [C] // ACISP, Information Security and Privacy. Berlin: Springer-Verlag, 2006.
  • 10Au M H, Chen J, Liu J K, et al. Malicious KGC attacks in certificateless cryptosystems[C] // Com- puter and Communications Security. New York: ACM, 2007.

共引文献31

同被引文献25

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部