期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones
1
作者 Zhuo Zhao chingfang hsu +3 位作者 Lein Harn Zhe Xia Xinyu Jiang Liu Liu 《Cybersecurity》 2025年第4期57-70,共14页
As mobile internet and Internet of Things technologies continue to advance,the application scenarios of peer-to-peer Internet of Drones(IoD)are becoming increasingly diverse.However,the development of IoD also faces s... As mobile internet and Internet of Things technologies continue to advance,the application scenarios of peer-to-peer Internet of Drones(IoD)are becoming increasingly diverse.However,the development of IoD also faces signifcant challenges,such as security,privacy protection,and limited computing power,which require technological innova-tion to overcome.For group secure communication,it is necessary to provide two basic services,user authentication and group key agreement.Due to the limited storage of IoD devices,group key negotiation requires lightweight calculations,and conventional schemes cannot satisfy the requirements of group communication in the IoD.To this end,a new lightweight communication scheme based on ring neighbors is presented in this paper for IoD,which not only realizes the identity verifcation of user and group key negotiation,but also improves computational ef-ciency on each group member side.A detailed security analysis substantiates that the designed scheme is capable of withstanding attacks from both internal and external adversaries while satisfying all defned security requirements.More importantly,in our proposal,the computational cost on the user side remains unafected by the variability of the number of members participating in group communication,as members communicate in a non-interactive manner through broadcasting.As a result,the protocol proposed in this article demonstrates lower computational and communication costs in comparison to other cryptographic schemes.Hence,this proposal presents a more appealing approach to lightweight group key agreement protocol with user authentication for application in the IoD. 展开更多
关键词 IoD Secure group communications Group key agreement User authentication Asymmetric bivariate polynomial Lightweight ring-neighbor-based
原文传递
A novel threshold changeable secret sharing scheme 被引量:1
2
作者 Lein HARN chingfang hsu Zhe XIA 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第1期127-133,共7页
A(t,n)threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty computing.In conventional threshold secret sharing schemes,like Shamir’s scheme based o... A(t,n)threshold secret sharing scheme is a fundamental tool in many security applications such as cloud computing and multiparty computing.In conventional threshold secret sharing schemes,like Shamir’s scheme based on a univariate polynomial,additional communication key share scheme is needed for shareholders to protect the secrecy of their shares if secret reconstruction is performed over a network.In the secret reconstruction,the threshold changeable secret sharing(TCSS)allows the threshold to be a dynamic value so that if some shares have been compromised in a given time,it needs more shares to reconstruct the secret.Recently,a new secret sharing scheme based on a bivariate polynomial is proposed in which shares generated initially by a dealer can be used not only to reconstruct the secret but also to protect the secrecy of shares when the secret reconstruction is performed over a network.In this paper,we further extend this scheme to enable it to be a TCSS without any modification.Our proposed TCSS is dealer-free and non-interactive.Shares generated by a dealer in our scheme can serve for three purposes,(a)to reconstruct a secret;(b)to protect the secrecy of shares if secret reconstruction is performed over a network;and(c)to enable the threshold changeable property. 展开更多
关键词 cryptography 94A60 authentication and secret sharing 94A62
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部