期刊文献+

基于区块链技术的非交互式密钥协商系统 被引量:2

Non-interactive Key Agreement System Based on Block-chain Technology
下载PDF
导出
摘要 提出一种基于区块链技术的物联网信息非交互式通信方法及系统模型,通过Diffie-Hellman密钥协商协议和RSA签名认证,将区块链技术的分散网络特性应用于物联网通信中的去中心化,实现了物联网用户间端到端的安全通信,同时也保证了对第三方可信任机构的低依赖和解决IOT数据兼容问题,有效减少了物联网系统的运维成本。 A non-interactive communication method and system model of Internet of things based on block-chain technology is proposed.Through DH key agreement protocol and RSA signature authentication,the decentralized network characteristics of block-chain technology are applied to the decentralization of Internet of things communication,and the end-to-end secure communication between Internet of things users is realized.At the same time,it also ensures the low dependence on the third-party trusted institutions and solves the problem of IOT data compatibility,which effectively reduces the operation and maintenance costs of the Internet of things system.
作者 李致远 何握瑜 闫宇辰 张启辰 LI Zhiyuan;HE Woyu;YAN Yuchen;ZHANG Qichen(School of Cyber Engineering, Xidian University, Xi’an 710071, China)
出处 《信息工程大学学报》 2022年第1期81-86,共6页 Journal of Information Engineering University
关键词 区块链技术 非交互式密钥协商 物联网 签名认证 block-chain technology non-interactive key agreement IOT signature authentication
  • 相关文献

参考文献6

二级参考文献50

  • 1王金贵.浅谈物联网计算机网络安全与控制[J].中国新通信,2020,0(2):142-142. 被引量:3
  • 2王飞跃.人工社会、计算实验、平行系统——关于复杂社会经济系统计算研究的讨论[J].复杂系统与复杂性科学,2004,1(4):25-35. 被引量:234
  • 3Rafaeli S, Hutchison D. A survey of key management for secure group communication [J]. ACM Computing Surveys, 2003, 35(3): 309-329.
  • 4Zhao Xingwen, Zhang Fangguo, Tian Haibo. Dynamic asymmetric group key agreement for ad hoc networks [J]. Ad Hoc Networks, 2011, 9(5): 928-939.
  • 5Cao X, Kou W, Du X. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010, 180(15): 2895- 2903.
  • 6Chang Tingyi, Hwang Minshiang, Yang Weipang. A communication efficient three-party password authenticated key exchange protocol [J]. Information Sciences, 2011, 181 (1): 217-226.
  • 7Guo Hua, Li Zhoujun, Mu Yi, et al. Provably secure identity based authenticated key agreement protocols with malicious private key generators [J]. Information Sciences, 2011, 181(3):628-647.
  • 8Zhang L, Zhang F, Wu Q, et al. Simulatable certificateless two-party authenticated key agreement protocol[J]. Information Sciences, 2010, 180(6): 1020-1030.
  • 9Just M, Vaudenay S. Authenticated multi-party key agreement [G] //LNCS 1163: Proc of the 1996 Int Conf on the Theory and Applications of Cryptology and Information Security. Berlin: Springer, 1996: 36-49.
  • 10Burmester M, Desmedt Y. A secure and scalable group key exchange system [J]. Information Processing Letters, 2005, 94(3): 137-143.

共引文献245

同被引文献51

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部