期刊文献+

分布式网络中基于IDPKC的私钥更新方案 被引量:3

Private key updating scheme of identity-based public key cryptography under distributed network
在线阅读 下载PDF
导出
摘要 提出了一种基于身份的公钥密码体制(IDPKC)的分布式网络私钥更新方案,新方案通过引入一个映射函数,将用户的更新请求均匀地分配在整个更新时段内,避免了更新请求的拥塞现象。并且进一步给出了新方案下用户私钥更新和会话密钥协商过程。通过分析,该方案能满足安全性要求,并且具有较好的扩展性。 A new private key updating scheme of IDPKC under distributed network was proposed. The new scheme allotted all updating requests to the entire updating period by introducing a mapping function, and avoided the congestion of updating requests. The paper also introduced the private key updating process and the session key agreement process under the new scheme. Analysis shows the new scheme can fulfill the security requirement and has high expansibility.
出处 《计算机应用》 CSCD 北大核心 2009年第7期1825-1827,共3页 journal of Computer Applications
基金 国家863计划项目(2006AAJ124)
关键词 私钥 身份密码体制 分布式网络 private key identity-based cryptography distributed network
  • 相关文献

参考文献6

  • 1SHAMIR A . Identity based cryptosystems and signature schemes [ C]// Proceedings of CRYPTO 84 on Advances in Cryptology. New York: Springer-Verlag, 1984:47 -53.
  • 2BONEH D, FRANKLIN M. Dentity-based encryption from the Weil pairing[ C]// Advances in Cryptology CRYPTO 2001. Berlin: Springer-Verlag, 2001 : 213 - 229.
  • 3彭长艳,沈亚敏,王剑,张权,唐朝京.基于身份的空间网络安全研究[J].飞行器测控学报,2008,27(3):56-62. 被引量:8
  • 4杜春来,胡铭曾,张宏莉.在椭圆曲线域中基于身份认证的移动ad hoc密钥管理框架[J].通信学报,2007,28(12):53-59. 被引量:21
  • 5SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979,22 (11):612 -613.
  • 6UCN/LBL/VINT. Network simulator-NS2 [ EB/OL]. [ 2008 - 11 - 20]. http://www-mash, es. berkeley, edu/ns.

二级参考文献16

  • 1王剑,张权,唐朝京.空间Internet的安全体系结构[J].中国空间科学技术,2006,26(1):40-47. 被引量:5
  • 2沈荣骏.我国天地一体化航天互联网构想[J].中国工程科学,2006,8(10):19-30. 被引量:132
  • 3ZHOU L D, HASS Z J. Securing ad hoc networks[J]. IEEE Network, Special Issue on Network Security, 1999, 13(6): 24-30.
  • 4LEHANE B, DOLYE L, O'MAHONY D. Ad hoc key management infrastructure[A]. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05)[C]. Las Vegas, NV, United States, 2005.540-545.
  • 5LI J, CUI G H, FU X Q, et al. A secure group key management scheme in mobile ad hoc networks[A]. Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing (WCNM 2005) [C].Wuhan,China,2005.1156-1159.
  • 6CHA J C, CHEON J H. An identity-based signature from gap Diffie-Hellman group[A]. Proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptography(PKC2003)[C]. Miami, Florida, USA, 2003.18-30.
  • 7CHAUM D, PEDERSEN T E Wallet databases with observers[A]. Proceedings of the 12th Annual International Cryptology Conference(CRYPTO '92)[C]. Santa Barbara, California, USA,1993.89-105.
  • 8Bhasin K, Hayden J L. Space Internet Architectures and Technologies for NASA Enterprises[J]. International Journal of Satellite Communications,2002,20(5) :311-332.
  • 9CCSDS. Security Threats Against Space Missions[EB/OL]. E2006]. http://public, ccsds. org/publications/archive/350X1g1. pdf.
  • 10Shamir A. Identity Based Cryptosystems and Signatures Sehemes[C].In: Proceedings of CRYPTO84 on Advances in Cryptology, Santa Barbara, California, United States, 1984.47-53.

共引文献26

同被引文献14

  • 1杨德明,慕德俊,许钟.Ad hoc空间网络密钥管理与认证方案[J].通信学报,2006,27(8):104-107. 被引量:17
  • 2Shamir A. Identity-based Cryptosystems and Signature Schemes [C]//Proc. of CRYPTO' 84. New York, USA: [s. n]. 1984: 47- 53.
  • 3Boneh D, Franklin M. Dentity-based encryption from the Weil pairing [C] // Advances in Cryptology CRYPTO 2001. Berlin: Springer-Verlag, 2001 : 213-229.
  • 4Zhou L, Hass Z J. Securing Ad-hoc networks[J]. IEEE Networks, 1999,13 (6): 24-30.
  • 5Zhou Lidong, Hass Z J. Securing Ad Hoc Networks[J]. IEEE Net- works, 1999, 13(6): 24-30.
  • 6Al-Riyami SS,Paterson KG.Certificateless public key cryptography[].Advances in Cryptography-Asiacry-pt’.2003
  • 7Wang K,Zhao Z W,Yao L.An agile reconfigurable key distribution scheme in space information network[].IEEE Conference on Industrial Electronics and Applications.2007
  • 8彭长艳,沈亚敏,王剑,张权,唐朝京.基于身份的空间网络安全研究[J].飞行器测控学报,2008,27(3):56-62. 被引量:8
  • 9吴平,王保云,徐开勇.基于身份的Ad Hoc网络密钥管理方案[J].计算机工程,2008,34(24):143-145. 被引量:6
  • 10罗长远,李伟,邢洪智,初晓.空间网络中基于身份的分布式密钥管理研究[J].电子与信息学报,2010,32(1):183-188. 被引量:18

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部