期刊文献+

Ad Hoc网络中的组密钥生成协议 被引量:1

Group Key Establishment Protocols in Ad Hoc Networks
下载PDF
导出
摘要 由于AdHoc网络缺少基础通信设施的支持,网络拓扑的动态变化,使得传统的基于可信任第三方的CA认证方案不再适用,而基于门限加密的分布方案有其固有的假设条件,在具体实施时也有很大的困难。区别于分布方案,该文介绍的组密钥协议不需要有安全信道的假设,所有的节点都参与密钥的生成。该文分类分析了几种协议的前后向安全性,容错性和密钥生成时的认证功能。并在此基础上对协议的复杂度做了比较,给出了进一步完善协议需解决的问题。 The traditional Certification Authority is not applicable in Ad Hoc networks because they have no infrastruc-ture and topology of network is dynamic.The distribution CA services based on threshold cryptography have difficulties in practice because of their strong assumption.This paper introduces several protocols about group key establishment that are contributory in Ad Hoc networks.We analyze them in forward security,fault tolerant and authentication,compare complexity of these protocols and present the problems should be settled in future research.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第10期142-145,共4页 Computer Engineering and Applications
基金 山东省自然科学基金(编号:Y2002G10)的资助
关键词 AD HOC 组密钥生成 自组网络 认证 Ad Hoc,group key establishment ,Ad Hoc Network,authentication
  • 相关文献

参考文献10

  • 1L Zhou,Z J Haas.Securing ad hoc networks[J].IEEE Network Magazine,1999; 13(6) :24~30.
  • 2H Luo,P Zerfos,J Kong et al.Self-securing ad hoc wireless networks [C].In:Seventh IEEE Symposium on Computers and Communications(ISCC),2002?A.
  • 3W Diffie,M Hellman.New directions in cryptography[J].IEEE Transaction on Information Theory,1976;IT-22(6) :644~654.
  • 4M Bellovin,M Merrit.Encrypted key exchange :password based protocols secure against dictionary attacks[C].In :Proceeding of the IEEE Symposium on Research in Security and Privacy,1992.
  • 5I Ingemarsson,Donlabd T Tang,C K Wong.A conference key distribution system[J].IEEE Transaction on Information Theory,1982;IT28(5) :714~720.
  • 6M Burmester,Y Desmedt.A secure and efficient conference key distribution system.in Advance in Cryptology-EUROCRYPT,1994:275~286.
  • 7K Becker,Uta Wille.Communication complexity of group key distribution system[C].In:5 ACM conference on Computer and Communication Security,1998.
  • 8N Asokan,P Ginzborg.Key agreement in ad hoc networks[J].Computer Communications,2000; 11(8) :769~780.
  • 9M Steiner,G Tsudik,M Waidner.Key agreement in dynamic peer groups[J].IEEE Transactions on Parallel and Distributed System,2000;11(8).
  • 10G Ateniese,M Steiner,G Tsudik.New multiparty authentication services and key agreement protocols[J].IEEE Journal on Selected Areas in Communications,2000; 18(4).

同被引文献5

  • 1徐倩,张福泰,刘志高,黄欣沂.无证书的环签名方案[J].计算机工程与应用,2006,42(2):116-120. 被引量:5
  • 2Zhou L,Haas Z J.Securing Ad Hoc networks[J].IEEE Network Magazine,1999,13 (6):24-30.
  • 3Luo H,Zeffos P,Kong J.Self-securing Ad Hoc wireless networks[C]//Seventh IEEE Symposium on Computes and Communications.Italy:[s.n.],2002:567-574.
  • 4Wu Tzong-sun,Hsu Chien-lung.Threshold signature scheme using self-certified public keys[J].The Journal of Systems and Software,2003,67(2):88-97.
  • 5Girault M.Self-certified public keys[C]//Advances in Cryptology-EUROCRYPT'91.[S.l.]:Springer-Verlag,1992:490-497.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部