期刊文献+

一种IBE机制下的端到端密钥管理方案 被引量:4

End-to-end key management based on IBE
在线阅读 下载PDF
导出
摘要 密钥管理是基于移动通信系统进行端到端加密的核心问题,现有方案大多依赖于密钥管理中心,并存在不在同一加密组内的终端要进行端到端加密通信时通信消耗大、效率低等问题。为解决这些问题,提出一种基于IBE(Identity Based Encryption)的三级密钥管理方案。该方案适于在资源有限的移动终端上使用,采用IBE机制生成和管理主密钥,简化了密钥协商过程,降低了对密钥管理中心的依赖,使用对称加密算法加密通信信息,确保通信的高效性。通信双方可进行双向认证,具有前向安全性,可抵抗选择密文攻击。 Key management is the core problem in the end-to-end encryption based on mobile communication system. Most existing schemes depend on KMC(Key Management Center), and have problems of high cost in communication, low efficiency. A three-layer key management scheme is provided based on IBE(Identity Based Encryption), which suits to mobile terminals. The master keys are produced and managed under the IBE mechanism, so the flow of key exchange is simplified and the dependency on the KMC is reduced. Communication data are encrypted in symmetric encryption algorithm to ensure the high efficiency. The two sides in the communication can do bidirectional authentication, have forward-security and defence of choose cipher attack.
出处 《计算机工程与应用》 CSCD 2012年第1期116-119,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.61070207)
关键词 端到端加密 基于身份信息加密算法(IBE) 密钥管理 end-to-end encryption Identity Based Encryption(IBE) key management
  • 相关文献

参考文献15

二级参考文献138

共引文献96

同被引文献39

  • 1石井,吴哲,谭璐,王昊鹏,王娜.RSA数据加密算法的分析与改进[J].济南大学学报(自然科学版),2013,27(3):283-286. 被引量:26
  • 2林秦颖,桂小林,史德琴,王小平.面向云存储的安全存储策略研究[J].计算机研究与发展,2011,48(S1):240-243. 被引量:19
  • 3XIANG Guang-li,CHEN Xin-meng,ZHU Ping,MA Jie.A Method of Homomorphic Encryption[J].Wuhan University Journal of Natural Sciences,2006,11(1):181-184. 被引量:8
  • 4王贵林,卿斯汉.对一种多重密钥共享认证方案的分析和改进[J].软件学报,2006,17(7):1627-1632. 被引量:11
  • 5Yu Yu,Leiwo J,Premkumar B.A study on the security of privacy homomorphism[C]//Proc of the 3rd International Conference on Information Technology,2006,10:470-475.
  • 6Zhan J,Chang Ziwu,Matwin S.Using homomorphic encryption for privacy-preserving collaborative decision tree classification[C]//Proc of Computational Intelligence and Data Mining,2007,11:637-645.
  • 7Agrawal R,Kieran J,Srikant R,et al.Order preserving encryption for numeric data[C]//Proceedings of the 2004ACM SIGMOD International Conference on Management of Data,2004,8:563-574.
  • 8Boldyreva A,Chenette N,Oneill A.Order-preserving encryption revisited:improved security analysis and alternative solutions[C]//Advances in Cryptology,2011,8:578-595.
  • 9王正飞,汪卫,施伯乐.加密数据的一种高效查询方法[J].计算机工程与应用,2010,46(5):80-82.
  • 10周水庚,李丰,陶宇飞,肖小奎.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-861. 被引量:222

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部