期刊文献+

基于双线性对的卫星网络密钥协商协议 被引量:1

Key Agreement Protocol in Satellite Network Based on Bilinear Pairings
在线阅读 下载PDF
导出
摘要 提出一种基于双线性对的卫星网络密钥协商协议,分析卫星网络的特点,给出协议实现过程。对协议的安全性分析表明,该协议不存在密钥托管问题,能抵御主动攻击,会话密钥协商满足不可控性。对协议的性能分析表明,该协议能提高会话密钥协商效率,满足实际的卫星网络密钥协商需求。 This paper proposes a key agreement protocol in satellite network based on bilinear pairings. It analyzes the characteristics of the satellite network and gives the implementation procedure of the protocol. Security analysis demonstrates that the key agreement protocol can resist active and passive attacks without key trusteeship problem and the key generating process is uncontrolled. Performance analysis demonstrates that the protocol can increase the efficiency of the session key agreement, it is more satisfied with needs of key generation in real satellite network.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第24期132-135,共4页 Computer Engineering
关键词 卫星网络 双线性对 离散对数问题 密钥协商 主动攻击 satellite network bilinear pairings discrete logarithm problem key agreement active attack
  • 相关文献

参考文献6

二级参考文献45

  • 1王剑,张权,唐朝京.空间Internet的安全体系结构[J].中国空间科学技术,2006,26(1):40-47. 被引量:5
  • 2沈荣骏.我国天地一体化航天互联网构想[J].中国工程科学,2006,8(10):19-30. 被引量:132
  • 3Zhou Lidong, Schneider F B, Van R R. COCA: A Secure Distributed On-line Certification Authority[J]. ACM Transactions on Computer Systems, 2002, 20(4): 329-368.
  • 4Shamir A. How to Share a Secret[J]. Communication of the ACM, 1979, 22(11): 612-613.
  • 5Luo Haiyun, Kong Jiejun, Zerfos P, et al. URSA: Ubiquitous and Robust Access Control for Mobile Ad-hoc Networks[J]. IEEE/ ACM Transactions Networking, 2004, 12(6): 1049-1063.
  • 6Douceur J R. The Sybil Attack[C]//Proc. of the 1st Int'l Workshop on Peer-to-Peer Systems. Gambridge, MA, USA: Springer-Verlag, 2002:251-260.
  • 7Jarecki S, Saxena N, Yi J H. An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol[C]//Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. [S. l.]: ACM Press, 2004.
  • 8Guttman E PKI: Its Not Dead, Just Resting[J]. IEEE Computer, 2002, 35(8): 41-49.
  • 9Shamir A. Identity Based Cryptosystems and Signature Schemes[C]//Proc. of CRYPTO'84. New York, USA: [s. n.], 1984: 47-53.
  • 10Zhang Yanchao, Liu Wei, Lou Wenjing, et al. AC-PKI: Anonymous and Certificate-less Public Key Infrastructure for Mobile Ad Hoc Networks[C]//Proc. of IEEE Int'l Conf. on Comm.. [S. l.]: IEEE Press, 2005: 3515-3519.

共引文献36

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部