期刊文献+

基于椭圆曲线密码体制的Ad Hoc保密与认证协议 被引量:1

A Privacy and Authentication Protocol of Ad Hoc Networks Based on ECC
原文传递
导出
摘要 针对AdHoc终端计算资源受限的特点,提出了一种基于椭圆曲线密码体制的AdHoc网络保密与认证协议。该协议在椭圆曲线密码体制加解密方案和数字签名方案的基础上,结合AdHoc网络的特点,引入一次性口令生成算法HOTP(HMAC-Based One-Time Password Algorithm),在节省计算资源的同时,保证了协议的安全性。 Terminals of Ad Hoc Networks are an efficient privacy and authentication protocol to the Elliptic Curve Cryptosystem, the protocol security of the protocol while saving computing limited in the computing resources. Considering the situation, based on Elliptic Curve Cryptosystem is proposed. In addition combines a one-time password algorithm, thus guaranteeing the resources.
出处 《通信技术》 2008年第11期117-119,共3页 Communications Technology
基金 国家自然科学基金资助项目(编号:60672102)。
关键词 椭圆曲线密码体制 Ad HOC网络 一次性口令 保密与认证 elliptic curve cryptosystem Ad Hoc networks one-time password privacy and authentication
  • 相关文献

参考文献4

二级参考文献23

  • 1Z J Haas,Parlman.The performance of query control schemes for zone routing protocol [J]. ACM/Trans. Net,2001,9(4) :427 - 438.
  • 2D B Johnson, D A Maltz. Dynamic Source Routing in Ad-Hoc Wireless Networks [M]. Mobile Comp. 1996.153 - 81.
  • 3F Stajano, R Andersson. The resurrecting duckling: Security issues in Ad-hoc wireless networks [ A]. Security Protocols, 7^th International Workshop Proceedings [ C]. LNCS Springer-Verlag, 1999.102 - 105.
  • 4R Gennaro, et al. Robust threshold DSS signatures [ A ]. Advances in Cryptography, Proc. Eurocrypt' 96 [ C ]. Springer-Verlag, 1996.
  • 5Y Frakel, et al. Proactive RSA [ A ]. Advances in Cryptography, Proc.crypt'97 [C]. Springer-Verlag, 1997.440 - 454.
  • 6Lamport, et al. The byzatine generals problem [ J J. ACM Trans On Programming languages and Systems, 1982,4:382 -401.
  • 7Y Desmedt, S Jajodia. Redistributing Secret Shares in New Access Structures and Its Application [ R]. George Masion University, 1997.
  • 8RFC1321 .The MD5 Message Digest Algorithm .
  • 9Lidong Zhou, Zygmunt J Hass. Securing Ad Hoc networks [ J ]. IEEE Network, 1999:24 - 29.
  • 10Tomas Sander, Christian Tschudin. Protecting mobile agents against malicious hosts [R]. Forthcoming LNCS, 1998.

共引文献39

同被引文献10

  • 1PERRIG A, CANETTI R, TYGAR J D, et al. The TESLA Broadcast Authentication Protocol[J]. Cryptobytes, 2002, 5(2): 2-13.
  • 2PERRIG A, SZEWCZYK R, WEN V, et al. SPINS: Security Protocols for Sensor Networks[J]. Wireless Networks, 2002, 8(5): 521-534.
  • 3MITCHELL C. Remote User Authentication using Public Information[C]//Proceedings of 9th IMA International Conference. Cirencester, UK: [s.n.], 2003: 360-369.
  • 4HAMMELL J, WEIMERSKIRCH A, Girao J, et al.Recognition in a Low-power Environment[C]//Proceedings of the Second International Workshop on Wireless Ad Hoc Networking(WWAN). Washington DC: [s.n.], 2005: 933-938.
  • 5MASHATAN A, STINSON D. A New Message Recognition Protocol for Ad Hoc Pervasive Networks[C]//Proceedings of 7th International Conference, CANS 2008. Hong-Kong, China: [s.n.], 2008: 378-394.
  • 6GONZALEZ M, STEINWANDT R. Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson[C]// Revised Selected Papers of 12th International Conference. Seoul, Korea: [s.n.], 2010: 362-373.
  • 7LAMPORT L. Password Authentication with Insecure Communication[J]. Communication of the ACM, 1981, 24(11): 770-772.
  • 8王朋海,李光松,韩文报.基于ECC的无线Mesh网络身份认证方案[J].信息安全与通信保密,2009,31(1):98-100. 被引量:2
  • 9施荣华,翁丽萍,王国才.基于单向哈希链的Ad Hoc网络密钥协商协议[J].湖南大学学报(自然科学版),2011,38(3):77-81. 被引量:5
  • 10李胜金,张昌宏,周大伟.一种基于ECDH的可认证密钥协商协议[J].信息安全与通信保密,2011,9(7):70-72. 被引量:9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部