期刊文献+

基于身份加密的可认证密钥协商协议 被引量:11

Identity-based Encryption Authenticated Key Agreement Protocol
在线阅读 下载PDF
导出
摘要 密钥协商是安全通信的重要环节,通过密钥协商协议可在通信节点之间建立共享会话密钥,以便实现网络中的安全通信。在物联网环境下,文章提出的密钥协商协议是在基于身份的可认证密钥协商基础上的无双线性对的可认证密钥协商协议。该协议主要包括3个部分:初始化、参数提取和密钥协商。与利用双线性对的密钥协商协议相比,该协议不仅提供了相同层次的安全性与可扩展性,且在能量开销、时间开销和计算复杂度方面具有明显的优势。 The key agreement is an important part of the secure communication. By the key agreement protocol. the shared session key is established between communication nodes in order to achieve secure communications in network. In the context of the Internet of Things, the authenticated key agreement protocol proposed in this paper is based on identity-based authenticated key agreement protocol without the bilinear pairing. The protocol mainly includes three parts: initialization, parameter extraction and key agreement. Comparing with the key agreement protocol using bilinear pairings, the protocol not only provides the same level of security and scalability, but also has obvious advantages in terms of energy overhead, time overhead and computational complexity.
作者 袁艳祥 游林
出处 《信息网络安全》 2014年第3期1-6,共6页 Netinfo Security
基金 国家自然科学基金[61272045] 浙江省自然科学基金[R1090138]
关键词 物联网 基于身份加密 可认证密钥协商 The Internet of Things identity-based encryption authenticated key agreement
  • 相关文献

参考文献15

二级参考文献95

共引文献38

同被引文献150

  • 1蔡东蛟.网络信任体系和PKI/PMI应用[J].信息技术,2007,31(9):40-42. 被引量:3
  • 2MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12.
  • 3ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144.
  • 4KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11.
  • 5PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397.
  • 6NanceK, Hay B, Bishop M. virtual machine introspection[J].IEEEComputer Society, 2008.
  • 7XiongH, Liu Z, Xu W, et al. Libvmi: A Library for Bridging theSemantic Gap between vip OS and VMM[C]//Computer andInformation Technology (CIT), 2012 IEEE 12th International Conferenceon. IEEE, 2012: 549-556.
  • 8WangY, Hu C, Li B. Vmdetector: a VMM-based platform to detecthidden process by multi-view comparison[C]//High-Assurance SystemsEngineering (HASE), 2011 IEEE 13th International Symposium on. IEEE,2011: 307-312.
  • 9Li tty L, Lagar-CavilJa H A, Lie D. Hypervisor Support for IdentifyingCovertly Executing Binaries[C]//USENIX Security Symposium. 2008:243-258.
  • 10TomlinsonA. Introduction to the TPM [M]//Smart Cards, Tokens,Security and Applications. New York: Spring US,2008:155-172.

引证文献11

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部