期刊文献+

基于无证书密码体制和区块链结合的物联网设备访问控制方案研究

Research on Access Control Scheme of IoT Device Based on Combination of Certificateless Cryptography and Blockchain
下载PDF
导出
摘要 针对物联网场景中的设备细粒度访问控制,提出一种高效实现方案,采用基于无证书密码体制和区块链访问控制相结合的方式,利用高效的无证书密码技术实现区块链中各种节点的身份管理,通过区块链维护节点关系和访问权限,通过基于智能合约的访问验证体系实现访问管控,形成安全的物联网细粒度访问控制体系;采用契合区块链和物联网的无证书密钥体系,设计高效的基于区块链的访问控制,提高访问效率、动态性、系统扩展性和伸缩性,降低部署成本。 Aiming at the fine-grained access control of devices in the Internet of Things scenario,it proposes an efficient implementation scheme.It adopt.combination of certificate-free cryptosystem and blockchain access control,and uses efficient certificate free cryptography to implement the identity management of various nodes in the blockchain.The node relationship and access authority are maintained through the blockchain,the access management and control is realized through the smart contract based access verification system,which form.secure Internet of Things fine-grained access control system.The certificate-less key system that fits blockchain and Internet of things is adopted,and the efficient access control system based on block-chain is designed,which could improve access efficiency,dynamism,system scalability and scalability,and reduce deploy-ment cost.
作者 谢国涛 王首媛 陈礼波 Xie Guotao;Wang Shouyuan;Chen Libo(China Information Technology Designin&Consulting Institute Co.,Ltd.,Beijing 100048,China)
出处 《邮电设计技术》 2021年第7期31-35,共5页 Designing Techniques of Posts and Telecommunications
关键词 无证书密码体制 物联网 访问控制 密码算法 Certificateless cryptography Internet of things Access control Cryptographic algorithm
  • 相关文献

参考文献7

二级参考文献36

  • 1顾纯祥,王磊,祝跃飞.无线自组网络上基于身份的密钥生成协议[J].计算机工程,2005,31(24):166-168. 被引量:2
  • 2Luo Haiyun, Kong Jiejun, Zeffos P, et al. URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks[J]. IEEE/ACM Trans. on Networking, 2004, 12(6): 1049-1063.
  • 3Zhang Yanchao, Liu Wei, Lou Wenjing, et al. AC-PKI: Anonymous and Certificate-less Public-key Infrastructure for Mobile Ad Hoc Networks[C]//Proc. of IEEE Int'l Conf. on Communication. [S. l.]: IEEE Press, 2005: 3515-3519.
  • 4Riyami S S A, Paterson K G. Certificateless Public Key Cryptography[C]//Advances in Cryptology ASIA CRYPT'03. [S.l.]: Springer-Verlag, 2003: 452-473.
  • 5DIFFIE W,HELLMAN M.New directions in Cryptography[J].IEEE Trans on Information Theory,1976,22(6):644-654.
  • 6JOUX A.A One-round protocol for tripartite Diffie-Hellman[C]// Proc of Algorithmic Number Theory Symposium.[S.l.]:Springer-Verlag,2000.
  • 7AL-RIYAMI S S,PATERSON K G.Tripartite authenticated key agreement protocols from pairings[M].[S.l]:Springer-Verlag,2003.
  • 8SHIM K.Efficient one-round tripartite authenticated key agreement protocol form the Weil pairing[J].Electronics Letters 2003(39):208-209.
  • 9AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography[C]// Proc of Advances in Cryptology-Asiacrypt.2003.
  • 10MANDT T K.Certificateless authenticated two-party key agreement protocols[D].Master′s Thesis.Gjviik University College,2006.

共引文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部