期刊文献+

一种非对等的移动Ad hoc网络密钥管理方案 被引量:1

An Asymmetric Key Management Scheme for Mobile Ad hoc Network
在线阅读 下载PDF
导出
摘要 针对实际应用中移动Ad hoc网络节点可能存在身份差异的情况,提出一种非对等的移动Ad hoc网络密钥管理框架及一个密钥共享方案,该方案可以生成2类不同的主私钥共享份额,结合2类共享份额才能恢复主私钥。基于上述方案中的密钥配置结构,给出一个移动Ad hoc网络限制验证者的数字签名方案。分析结果表明,该方案在签名阶段需执行1次模幂运算和1次欧几里得算法,在验证阶段需执行O(t)次模幂运算,并且方案具有较好的实用性,安全性与部分分布式密钥管理签名方案相同。 In the applications,the identity of nodes in mobile Ad hoc network may be different.According to the situation,this paper proposes an asymmetric key management framework for the mobile Ad hoc network.In order to satisfy the special framework,it designs a new secret sharing scheme for splitting the system private key,in which it generates two kinds of shares of the system private key: the special share and the ordinary share,so that it needs two kinds of shares to recover the system private key.Furthermore,it presents a limited verifier signature scheme in mobile Ad hoc network based on this secret sharing.Analysis results show that the scheme has a good availability since all nodes share the master private key and the decreases computation complexity,which is one time modular exponentiation and Euclid algorithm in signature phase,O(t) times modular exponentiation in verification phase.Besides,it is as safe as partially distributed key management sign scheme.
出处 《计算机工程》 CAS CSCD 2013年第2期103-107,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61173188 61173187) 安徽省自然科学基金资助项目(11040606M141) 安徽高校省级重点自然科学研究基金资助项目(KJ2010A009) 安徽大学"211工程"基金资助项目
关键词 移动AD HOC网络 密钥管理 数字签名 限制验证者 秘密共享 欧几里得算法 mobile Ad hoc network key management digital signature limited verifier secret sharing Euclid algorithm
  • 相关文献

参考文献10

  • 1Zhou Lidong,Hass Z J. Securing Ad Hoc Networks[J].IEEE Networks Special Issue on Network Security,1999,(06):24-30.
  • 2Luo Haiyun,Zerfos P,Kong Jiejun. Self-securing Ad hoc Wireless Networks[A].Taormina,Italy:IEEE Press,2002.567-574.
  • 3张玉臣,王亚弟,刘璟,马自堂,周雁舟,李晓.Ad Hoc网络环境下分布式密钥管理[J].武汉大学学报(理学版),2009,55(1):85-88. 被引量:9
  • 4Shamir A. How to Share a Secret[J].Communications of the ACM,1979,(11):612-613.
  • 5Luo Haiyun,Lu Songwu. Ubiqutous and Robust Authentication Services for Ad hoc Wireless Network[Tech.Rep.:TR-20030][R].Los Angeles,USA:University of California,2000.
  • 6Kong Jiejun,Zerfos P,Luo Haiyun. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks[A].IEEE Press,2001.
  • 7Kong Jiejun,Zerfos P,Luo Haiyun. Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks[J].IEEE/ACM Transactions on Networking,2004,(06):1049-1063.
  • 8Cheng Xiaofeng,Zhang Fangguo,Kim K. Limited Verifier Signature from Bilinear Pairings[A].Sydney,Australia:Springer-Verlag,2004.
  • 9王晓峰,张璟,王尚平,张亚玲,秦波.新的基于身份的广义指定验证者签名方案[J].电子学报,2007,35(8):1432-1436. 被引量:9
  • 10李顺东;王道顺.现代密码学:理论、方法与研究前沿[M]北京:科学出版社,2009.

二级参考文献25

  • 1许俊杰,曾贵华.基于椭圆曲线的Ad hoc网络门限身份认证方案[J].计算机工程与应用,2007,43(17):117-118. 被引量:7
  • 2Zhou L, Hass Z J. Securing Ad Hoe Networks[J]. IEEE Network Magazine, 1999,13(6) :24-30.
  • 3Luo H,Zerfos P,Kong J,et al. Self-Securing Ad Hoe Wireless Network[ C ]/ / Seventh IEEE Symposium on Computers and Communications. Taormina: IEEE Press, 2002 : 567.
  • 4Fokin K. Key Management in Ad Hoc Networks[EB/ OL]. [2008-01-11 ]. http ://www. computer. org/.
  • 5Manulis M. Key Agreement for Heterogeneous Mobile Ad-Hoc Groups[C]//Proceedings of the 2005 11th International Conference on Parallel and Distributed Systems. Washington D C:IEEE Press,2005:375.
  • 6Yi S,Kravets R. Key Management for Heterogeous Ad Hoc Wireless Network[C]//10th IEEE International Conference on Network Protocols. New York: IEEE Press, 2002 : 165.
  • 7Kong J,Zerfos P,Luo H,et al. Providing Robust and Ubiquitous Security Support for Mobile Ad Hoe Networks [ C ]/ / IEEE 9th International Conference on Networks Protocol. New York: IEEE Press, 2001 : 324.
  • 8Kong J,Zerfos P, Luo H ,et al. Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks [J]. ACM Transactions on Networking ,2004,12(6) : 1049- 1063.
  • 9Shamir A. How to Share a Secrete[J]. Communications of the ACM, 1979,22(11) : 612-613.
  • 10Simmons G J. How to (Really) Share a Seerete[EB/ OL]. [2007-12-16]. http://csdl2.computer. org/.

共引文献16

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部