期刊文献+

MANET网络簇结构下基于身份的密钥管理方案

Key management scheme based on identity in cluster structure of MANET
在线阅读 下载PDF
导出
摘要 针对MANET网络资源有限的特点,在其分级结构下提出一种基于身份的密钥管理方案。该方案结合基于身份的密码系统与椭圆曲线的离散对数难题、双线性对和加/解密技术。基于身份公钥的获取需要较少的计算量和通信量,不使用证书可以减少用户存储量,同时该方案的安全性建立在椭圆曲线机制和盲短签名技术上,有效解决了簇内节点的信任问题。通过分析证明,该方案在节约资源的同时具有较高的安全性。 According to the problem of the resources of MANET were limited,this paper proposed key management program based on identity in the hierarchical structure. It combined identity-based cryptography and elliptic curve of the discrete logarithm problem,encryption,decryption and bilinear pair. Getting the public key of identity-based cryptography requires less computation and communication cost. No using of certificates could reduce the amount of user memory. Security of the scheme based on elliptic curve mechanisms and blind signature. It effectively solved the problem of trust between nodes in the same cluster. The results show that the scheme saves resources and has high security.
出处 《计算机应用研究》 CSCD 北大核心 2010年第10期3859-3861,3865,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60773013)
关键词 移动ADHOC网络 簇结构 身份密码 椭圆曲线 密钥管理 MANET( mobile Ad hoc networks) cluster structure identity-based cryptography elliptic curve key management
  • 相关文献

参考文献8

  • 1BONEH D, FRANKLIN M. Identity-based encryption from the weil pairing[ C ]//Proc of Crypto 2001. Berlin: Springer-Verlag, 2001 : 213- 229.
  • 2杨波.现代密码学[M].2版.北京:清华大学出版社,2007.
  • 3STALLINGS W.密码编码学与网络安全-原理与实践[M].3版.北京:电子工业出版社.2005.
  • 4SUI Ai-fen, SHERMAN S M C, LUCAS C K H, et al. Separable and anonymous identity-based key issuing [ EB/OL ]. ( 2004-11 ) [ 2010- 03-15]. http://epring. iacr. org.
  • 5SHAMIR A. Identity-based cryptosystems and signature scheme[ C]// Proc of Cryptology-Crypto. Santa Barbara, CA: Springer-Verlag, 1984 : 47- 53.
  • 6ZHOU Nan-run, WAN Hui. Secure communication of cluster-based Ad hoc networks using ID-based cryptography [ C ]//Proc of the 8th International Symposium on Antennas, Propagation and EM Theory. [ S. l. ] : IEEE Press, 2008 : 1494- 1497.
  • 7杜春来,胡铭曾,张宏莉.在椭圆曲线域中基于身份认证的移动ad hoc密钥管理框架[J].通信学报,2007,28(12):53-59. 被引量:21
  • 8曾萍,陈瑞利,方勇.基于自认证公钥的全分布式移动Ad hoc网络密钥管理方案[J].计算机应用研究,2008,25(6):1779-1782. 被引量:6

二级参考文献24

  • 1王少辉,王美琴,张睿超,潘景山,王春梅.Adhoc网络密钥生成管理方案综述与分析[J].计算机应用研究,2004,21(10):9-11. 被引量:3
  • 2ZHOU L D, HASS Z J. Securing ad hoc networks[J]. IEEE Network, Special Issue on Network Security, 1999, 13(6): 24-30.
  • 3LEHANE B, DOLYE L, O'MAHONY D. Ad hoc key management infrastructure[A]. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05)[C]. Las Vegas, NV, United States, 2005.540-545.
  • 4LI J, CUI G H, FU X Q, et al. A secure group key management scheme in mobile ad hoc networks[A]. Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing (WCNM 2005) [C].Wuhan,China,2005.1156-1159.
  • 5CHA J C, CHEON J H. An identity-based signature from gap Diffie-Hellman group[A]. Proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptography(PKC2003)[C]. Miami, Florida, USA, 2003.18-30.
  • 6CHAUM D, PEDERSEN T E Wallet databases with observers[A]. Proceedings of the 12th Annual International Cryptology Conference(CRYPTO '92)[C]. Santa Barbara, California, USA,1993.89-105.
  • 7ZHOU L, HAAS Z J. Securing Ad hoc networks [J]. IEEE Network, 1999, 13(6):24-30.
  • 8SHAMIR A. How to share a secret[J]. ACM Comm, 1979, 22 (11) :612-613.
  • 9BECHLER M, HOF H, KRAFT D, et al. A clutter-based security architecture for Ad hoe networks [ C ] //Proc of the 23 rd Annual Joint Conference of the IEEE Computer and Communications Society. Hong Kong: [ s. n. ] ,2004.
  • 10HUBAUX J, BUTTYAN L, CAPKUN S. The quest for security in mobile Ad hoc networks[ C] //Proc of the 2nd ACM Symp on Mobile Ad hoc Networking and Computing. New York: ACM Press, 2001: 146-155.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部