摘要针对完全分布式密钥证书撤销方案中存在通信量过大的问题,文章在二次控告证书撤销机制的基础上,利用二分法的思想,分析传统方案中存在的主要不足,提出了一种完全分布式密钥证书撤销方案。经分析,改进后的方案能够大大地减少通信量和网络带宽,这对Ad Hoc(源自于拉丁语,意为:for this purpose only)网络来说是十分必要的。
2H. Deng, A. Mukherjee, D. P. Agrawal. Threshold and Identity- Based Key Management and Authentication for Wireless Ad Hoc Net- works [ C ]. 2004 International Conference on In- formation Technology: Coding and Computing (ITCC "04), Las Vegas, USA. 5 - 7 April, 2004.
3Li Jingfeng, Wei Dawei, Kou Hongzhao. Identity -based and threshold key management in mobile ad hoc networks [ C ]. 2006 International Confer- ence on Wireless Communications, Networking and Mobile Computing (WiCOM2006) , Wuhan, China. 22-24 Sept. 2006.
4T. P. Pedersen. Non - interactive and information -theoretic secure verifiable secret sharing [ C ]. In Advances in Cryptology - CRYPTO' 91, vol- ume 576 of Lecture Notes in Computer Science, Berlin, Springer - Verlag, 1992 :129 - 140.
5Sui A F, Sherman S M, Lucas C K, et al. Secure and anonymous identity -based key Issuing with- out secure channel [EB/OL]. (20 -11 - 2004)[ 30 - 11 - 2004 ]. http ://eprint. iacr. org, No- vember, 2004.
6J. Cha, J. Cheon. Anidentity based signature from Diffie - Hellman groups [ C ]. Public Key Cryptog- raphy Proceedings of PKC2003, LNCS2567, Y. Desmedted. PP. 18 - 30, Berlin: Springer - Ver- lag, 2003.
7Boneh, D & M Franklin. Identity- Based En-cryption from Well Pairing [ C ]. In proc. Ad- vances in Cryptology - CRYPTO'01, ed. J Kil- lian. Vol. 2139 of Lecture Notes in Computer Science Santa Barbara, California, USA : Spring- er- Verlag:213 - 229.
8Wu Ho-Ting, Ke Kai-Wei, Chen Chun-Hung, et al. Mobile awareness based cluster selection mechanisms in wireless Ad Hoc networks [C] //Vehicular Technology Conference, 2004: 2774-2778.
9Zhou Lidong,Hass Z J. Securing Ad Hoc Networks[J].IEEE Networks Special Issue on Network Security,1999,(06):24-30.
10Luo Haiyun,Zerfos P,Kong Jiejun. Self-securing Ad hoc Wireless Networks[A].Taormina,Italy:IEEE Press,2002.567-574.