期刊文献+

普适计算环境中基于身份的密钥管理方案

Identity-based Key Management Scheme in Pervasive Computing Environments
在线阅读 下载PDF
导出
摘要 针对普适环境中的密钥管理问题,利用椭圆曲线加法群设计了一种新的基于身份的密钥管理方案。新方案利用门限秘密共享机制构建了分布式密钥生成中心,并设计了私钥更新、主密钥分量更新和会话密钥协商策略。与现有基于身份密钥管理方案相比,新方案具有更强的安全性和更高的执行效率。 Considering the key management in pervasive computing environments, this paper proposed a novel identity- based key management scheme from additive elliptic curve group. It employs the secret-sharing technique to construct distributed private key generators, and designs the methods of updating private key, updating host-key shares and nego- tiating session key. It can achieve higher security requirements and has higher efficiency compared with available identi- ty-based schemes.
作者 孙凌 田源
出处 《计算机科学》 CSCD 北大核心 2013年第6期124-127,131,共5页 Computer Science
基金 河南省高等学校青年骨干教师资助计划基金项目(201104)资助
关键词 普适计算 密钥管理 基于身份的密码体制 门限机制 Pervasive computing, Key management, Identity-based cryptography, Threshold mechanism
  • 相关文献

参考文献9

  • 1徐光祐,史元春,谢伟凯.普适计算[J].计算机学报,2003,26(9):1042-1050. 被引量:259
  • 2Park J S,Sadi M G,Kim D S,et al.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network[C]//MADNES 2005.Singapore,2005:2-13.
  • 3Kausar F,Hussain S,Park J H,et al.A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks[C]// IFIP International Federation for Information Processing 2007.Taipei,Taiwan,2007:745-757.
  • 4Ge H.An Efficient Key Management Scheme for Pervasive computing[C]//IEEE International Conference on Multimedia.Irvine,USA,2005:657-661.
  • 5Moon J S,Park J H,Lee D G.Authentication and ID-Based Key Management Protocol in Pervasive environment[J].Wireless Personal Communications,2009,50 (3):221-233.
  • 6Shamir A.Identity Based Cryptosystems and signature schemes[C]//Proc.CRYPTO' 84.New York,USA,1984:47-53.
  • 7Sun H,Zheng X F,Deng Z Q.An Identity-based and Threshold Key Management Scheme for Ad hoc Networks[C]//IEEE International Conference on Networks Security Wireless Communications and Trusted Computing.Wuhan,2009:520-523.
  • 8Koblitz P,Menezes P,Vanstone S.The state of elliptic curve cryptography[J].Designs,Codes and Cryptography,2000,19:173-193.
  • 9Barreto P,Kim H,Lynn B,et al.Efficient algorithms for pairingbased cryphosystems[C]// CRYPTO2002.California,USA,2002:354-368.

二级参考文献43

  • 1Abowd G D, Dey A K, Brown P J, Davies N, Smith M,Steggles P. Towards a better understanding of context and context-awareness. In: Gellersen H Wed. Handheld and Ubiquitous Computing. Berlin: Springer, 1999. 304-307.
  • 2Castro P, Muntz R. Managing context data for smart spaces.IEEE Personal Communications, 2000, 7(5): 44-46.
  • 3Weiser M. The computer for the twenty-first century. Scientific American, 1991, 265(3): 94-104.
  • 4Dertouzos M. The future of computing. Scientific American,1999, 282(3): 52-63.
  • 5Norman D. The Invisible Computer. Cambridge, Mass: MIT Press, 1999.
  • 6Garlan D, Siewiorek D P, Smailagic A, Steenkiste P. Project aura: Toward distraction-free pervasive computing. IEEE Pervasive Computing, 2002, 1(4-6): 22-31.
  • 7Salz P. The disappearing computer. Time Europe, 2000, 155(8) : 1-8.
  • 8Vernier F, Leash N, Shen C. Visualization techniques for circular tabletop interfaces. MERL Cambridge Research, MA,USA:Technical Report: TR2002-01, 2002.
  • 9Xie Wei-Kai, Shi Yuan-Chun, Xu Guan-You. Smart classroom—— An intelligent environment for tele-education. In:Proceedings of the 2nd IEEE Pacific-Rim Conference on Multimedia, Beijing, China, 2001. 662-668.
  • 10Wilson J. Toward things that thinks for next millennium.IEEE Computer, 2000, 33(1): 72-76.

共引文献258

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部