期刊文献+

基于二分法的完全分布式密钥证书撤销方案

下载PDF
导出
摘要 针对完全分布式密钥证书撤销方案中存在通信量过大的问题,文章在二次控告证书撤销机制的基础上,利用二分法的思想,分析传统方案中存在的主要不足,提出了一种完全分布式密钥证书撤销方案。经分析,改进后的方案能够大大地减少通信量和网络带宽,这对Ad Hoc(源自于拉丁语,意为:for this purpose only)网络来说是十分必要的。
作者 刘建 陈元
出处 《信息通信》 2016年第6期48-49,共2页 Information & Communications
  • 相关文献

参考文献5

二级参考文献38

  • 1王晓峰,张璟,王尚平,张亚玲,秦波.新的基于身份的广义指定验证者签名方案[J].电子学报,2007,35(8):1432-1436. 被引量:9
  • 2H. Deng, A. Mukherjee, D. P. Agrawal. Threshold and Identity- Based Key Management and Authentication for Wireless Ad Hoc Net- works [ C ]. 2004 International Conference on In- formation Technology: Coding and Computing (ITCC "04), Las Vegas, USA. 5 - 7 April, 2004.
  • 3Li Jingfeng, Wei Dawei, Kou Hongzhao. Identity -based and threshold key management in mobile ad hoc networks [ C ]. 2006 International Confer- ence on Wireless Communications, Networking and Mobile Computing (WiCOM2006) , Wuhan, China. 22-24 Sept. 2006.
  • 4T. P. Pedersen. Non - interactive and information -theoretic secure verifiable secret sharing [ C ]. In Advances in Cryptology - CRYPTO' 91, vol- ume 576 of Lecture Notes in Computer Science, Berlin, Springer - Verlag, 1992 :129 - 140.
  • 5Sui A F, Sherman S M, Lucas C K, et al. Secure and anonymous identity -based key Issuing with- out secure channel [EB/OL]. (20 -11 - 2004)[ 30 - 11 - 2004 ]. http ://eprint. iacr. org, No- vember, 2004.
  • 6J. Cha, J. Cheon. Anidentity based signature from Diffie - Hellman groups [ C ]. Public Key Cryptog- raphy Proceedings of PKC2003, LNCS2567, Y. Desmedted. PP. 18 - 30, Berlin: Springer - Ver- lag, 2003.
  • 7Boneh, D & M Franklin. Identity- Based En-cryption from Well Pairing [ C ]. In proc. Ad- vances in Cryptology - CRYPTO'01, ed. J Kil- lian. Vol. 2139 of Lecture Notes in Computer Science Santa Barbara, California, USA : Spring- er- Verlag:213 - 229.
  • 8Wu Ho-Ting, Ke Kai-Wei, Chen Chun-Hung, et al. Mobile awareness based cluster selection mechanisms in wireless Ad Hoc networks [C] //Vehicular Technology Conference, 2004: 2774-2778.
  • 9Zhou Lidong,Hass Z J. Securing Ad Hoc Networks[J].IEEE Networks Special Issue on Network Security,1999,(06):24-30.
  • 10Luo Haiyun,Zerfos P,Kong Jiejun. Self-securing Ad hoc Wireless Networks[A].Taormina,Italy:IEEE Press,2002.567-574.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部