期刊文献+

适合移动Ad hoc网络基于群签名认证的弹性组密钥管理方案 被引量:2

Group key management scheme based on group signature with fault tolerance for mobile Ad hoc networks
在线阅读 下载PDF
导出
摘要 针对移动Ad hoc网络中的安全组通信系统,提出了一个基于群签名认证的分布式组密钥管理方案。该方案利用门限密码技术并借鉴了PKI证书管理的第三方签名认证思想,在提高认证可信度的同时,极大地减少了密钥协商过程中所需的认证开销。分析表明,该方案具有良好的容错性;达到了第3级信任;能够抵抗网络中典型的主动和被动攻击;具备完美的前向和后向保密性;极大地降低了计算和通信开销。 According to the characteristics of group communication in mobile Ad hoc networks,this paper proposed a distributed key management scheme based on group signature authentication.By adopting the threshold cryptography and the method of third-party signature authentication,this scheme enhanced the authentication reliability and reduced largely the authentication cost in key agreement process greatly.The analysis shows this scheme is provably secure against the active and passive attacks with fault-torrance,achieves the trust level 3,has perfect forward and backward secrecy,and reduces the cost of computation and communication greatly.
出处 《计算机应用研究》 CSCD 北大核心 2011年第10期3811-3816,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(60972078) 甘肃省自然科学基金资助项目(0809RJZA019 0916RJZA015)
关键词 组密钥管理 移动ADHOC网络 群签名 容错性 门限密码 双线性对 group key management mobile Ad hoc network group signature fault tolerance threshold cryptography bili-near pairings
  • 相关文献

参考文献19

  • 1YARSHNEY U. Multicast 'over wireless networks [ J ]. Communica- tions of the ACM,2002,45(12) :31-37.
  • 2ZHOU L D, HAAS Z J. Securing Ad hoc networks [ J]. IEEE Net- work Special Issue on Network Security,1999,13(6) :24-30.
  • 3ASOKAN N, GINZBOORG P. Key agreement in Ad hoc networks [ J 1. Computer Communications,2000,23 ( 17 ) : 1627-1637.
  • 4HIETALAHTI M. Efficient key agreement for Ad hoc networks [ D ]. Espoo: Helsinki University of Technology,2001.
  • 5WANG Li-ming, WU Chuan-kun. Efficient key agreement for large and dynamic multicast groups [ J ]. International Journal of Network Security,2006,1 (3) :8-17.
  • 6王晓峰,张璟,王尚平,张亚玲,秦波.基于口令认证的移动Ad Hoc网密钥协商方案[J].软件学报,2006,17(8):1811-1817. 被引量:18
  • 7周福才,徐剑,徐海芳,刘泽超.Ad hoc网络中基于双线性配对的STR组密钥管理协议研究[J].通信学报,2008,29(10):117-125. 被引量:13
  • 8SHAMIR A. Identity-based. cryptosystems and signature schemes [ C ]//Advances in Cryptology-CRYPTO. Berlin: Springer-Verlag, 1984:47-53.
  • 9Da SILVA E, Dos SANTOS A, ALBINI L C P,et al. Identity-based key management in mobile Ad hoc networks: techniques and applications [ J ]. IEEE Wireless Communications ,2008,15 (5) :46- 52.
  • 10KHALILI A, KATZ J. Toward secure key distribution in truly Ad hoc networks [ C ]//Proc of Symposium on Applications and the Intemet Workshops. 2003:342- 346.

二级参考文献41

共引文献47

同被引文献33

  • 1王群,钱焕延,赵钢.一种面向车联网的身份识别与定位方法[J].计算机科学,2012,39(S3):131-134. 被引量:4
  • 2李海峰,刘云芳.移动Ad Hoc网络中应用自认证的(t,n)门限群签名方案[J].北京联合大学学报,2006,20(3):19-22. 被引量:4
  • 3Yarshney U. Multicast over wireless networks [ J ]. Communications ofthe ACM, 2002, 45(12) :31 -37.
  • 4Zhou L d, HAAS Z J. Securing ad hoc networks [ J]. IEEE NetworkSpecial. Issue on Network Security, 1999,13 (6) : 24 —30.
  • 5Shamir A. Identity-based cryptosystems and signature schemes [ C]//Advances in Cryptology-CRYPTO * 84. Heidelberg: Springer- Verlag,1984:47-53.
  • 6Da Silva E, Dos Santos A,Albini L C P, et al. Identity-based keymanagement in mobile ad hoc networks : techniques and applications[J]. IEEE Wireless Communications,2008,15(5) : 46-52.
  • 7Khalili A, Katz J. Toward secure key distribution in truly Ad-Hoc net-works [C ] //Proceedings of the Symposium on Applications and the Inter-net Workshops (SAINT03). Orlando, FL,USA, 2003:342 -346.
  • 8Deng H,Mukherjee A, Agrawal D P. Threshold and identity-based keymanagement and authentication for wireless ad hoc networks [ C ] //Pro-ceedings of the International Conference on Information Technology :Coding and Computing (ITCC04). Las Vegas, USA,2004 : 107 - 110.
  • 9Stinson D R, Strobl R. Provably secure distributed schnorr signaturesand a (t, n) threshold scheme for implicit certificates [ C ] //Proceed-ings of the 6th Australasian Conference on Information Security andPrivacy, ACISP01. Springer-Verlag, 2001 :417 -434.
  • 10Luo H, Zefros P,Kong J, et al. Self-securing ad hoc wireless networks[C]//Proceeding of the Seventh IEEE Symposium on Computers andCommunications (ISCC02). Taormina, Italy, 2002;548 ~555.

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部