期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
1
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
下载PDF
A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation 被引量:1
2
作者 Yong-Woon Hwang Im-Yeong Lee 《Computers, Materials & Continua》 SCIE EI 2021年第11期1747-1764,共18页
Recently,with the advancement of Information and Communications Technology(ICT),Internet of Things(IoT)has been connected to the cloud and used in industrial sectors,medical environments,and smart grids.However,if dat... Recently,with the advancement of Information and Communications Technology(ICT),Internet of Things(IoT)has been connected to the cloud and used in industrial sectors,medical environments,and smart grids.However,if data is transmitted in plain text when collecting data in an IoTcloud environment,it can be exposed to various security threats such as replay attacks and data forgery.Thus,digital signatures are required.Data integrity is ensured when a user(or a device)transmits data using a signature.In addition,the concept of data aggregation is important to efficiently collect data transmitted from multiple users(or a devices)in an industrial IoT environment.However,signatures based on pairing during aggregation compromise efficiency as the number of signatories increases.Aggregate signature methods(e.g.,identity-based and certificateless cryptography)have been studied.Both methods pose key escrow and key distribution problems.In order to solve these problems,the use of aggregate signatures in certificate-based cryptography is being studied,and studies to satisfy the prevention of forgery of signatures and other security problems are being conducted.In this paper,we propose a new lightweight signature scheme that uses a certificate-based aggregate signature and can generate and verify signed messages from IoT devices in an IoT-cloud environment.In this proposed method,by providing key insulation,security threats that occur when keys are exposed due to physical attacks such as side channels can be solved.This can be applied to create an environment in which data is collected safely and efficiently in IoT-cloud is environments. 展开更多
关键词 Internet of things certificate-based aggregate signature key insulation cloud LIGHTWEIGHT physical attack
下载PDF
A Signcryption Scheme Based on Self-Certified Cryptography
3
作者 LIU Zhiyuan CHEN Jing 《Wuhan University Journal of Natural Sciences》 CAS 2014年第2期169-172,共4页
Self-certified signcryption can remove key escrow problem and certification management problem. Based on Boneh and Boyen's short signature scheme, a secure self-certified sign- cryption scheme is proposed. Under the ... Self-certified signcryption can remove key escrow problem and certification management problem. Based on Boneh and Boyen's short signature scheme, a secure self-certified sign- cryption scheme is proposed. Under the strong Diffie-Hellman assumption, the new scheme is proved secure, in which it satisfies public verifiability and existential unforgeablity. Furthermore, performance analysis shows that the proposed scheme only re- quires two pairing evaluations, so it can be used in the power and bandwidth limited environments. 展开更多
关键词 certificate-based signcryption bilinear parings strong Diffie-Hellman assumption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部