期刊文献+

基于ABE-IBS的WSN签名加密方法 被引量:1

ABE-IBS-based Signature Encryption Method for WSN
在线阅读 下载PDF
导出
摘要 在分析基于属性加密体制的基础上,结合椭圆曲线上双线性对的基于身份的签名体制,提出一种基于属性的加密和基于身份的签名一体化方法以及一个无线传感器网络签密方案。通过实验证明该方案具有复杂性及存储要求低等特性,且能够提高无线传感器网络的安全性能。 On the basis of Attribute-Based Encryption(ABE), and combining with the bilinear pairings on elliptic curves, an Attribute-Based Encryption with Identity-Based Signamre(ABE-IBS) scheme is proposed. Based on the scheme, one efficient signature-encryption scheme for Wireless Sensor Network(WSN) is presented. Analysis shows that proposed scheme has the low complexity and storage requirement, and can improve the security of WSN.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第3期143-145,148,共4页 Computer Engineering
基金 湖北省自然科学基金资助项目(2004ABA068)
关键词 基于属性的加密体制 网络安全 基于身份的密钥系统 无线传感器网络 Attribute-Based Encryption(ABE) network security identity-based cryptography Wireless Sensor Network(WSN)
  • 相关文献

参考文献2

二级参考文献10

  • 1Stallings W.Cryptography and Network Seeurity[M].4th ed.[S.l.]:Prentice Hall,2006.
  • 2Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//Proc.of Advances in CRYPTO'85.Santa Barbara,California,USA:Springer-verlag,1984:47-53.
  • 3Goyal V. Reducing Trust in the PKG in Identity-based Cryptoystems[C]//Proc.of CRYPTO'07.Santa Barbara,California,USA:Spfinge-Veflag.2007:430-447.
  • 4Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[C]//Proc.of Advances in CRYPTO'01.Santa Barbara,California,USA:Spnnger-Verlag,2001:213-229.
  • 5Cha J C,Cheon J H.An Identity-based Signature from Cap Diffie-Hellman Groups[C]//Proc.of PKC'03.Miami,FL,USA:Springer-Verlag,2003:18-30.
  • 6Beimel, A. Secure schemes for secret sharing and key distribution. PhD thesis, Technion - Israel Institute of Techonlogy, 1996
  • 7Blackley, G.R. Safeguarding cryptographic keys. In R. E. Merwin, J.T. Zanca, and M. Smith, editors,In: Proc. of the 1979 AFIPS National Computer Conference, Vol.48 of AFIPS Conference proceedings,313-317. AFIPS Press, 1979
  • 8Ito, M., Saito, A., Nishizeki, T. Secret sharing schemes realizing general access structure. In: Proc. of the IEEE Global Telecommunication Conf., Globecom 87, 99-102, 1987 Journal version: Multiple Assignment Scheme for Sharing Secret. J. of Cryptology, 6(1): 15-20 1993
  • 9Shamir, A. How to share a secret. Communications of the ACM, 22:612-613 (1979)
  • 10Simmons, G.J. Contemporary Cryptology - The Science of Information Integrity, 1992

共引文献8

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部