首页 | 官方网站   微博 | 高级检索  
     

基于身份的Ad Hoc网络门限密钥发送协议
引用本文:任勇军,王建东,庄毅,方黎明.基于身份的Ad Hoc网络门限密钥发送协议[J].武汉大学学报(工学版),2007,40(5):133-136.
作者姓名:任勇军  王建东  庄毅  方黎明
作者单位:南京航空航天大学信息科学与技术学院,江苏,南京,210016
摘    要:目前已提出的多个基于身份的密钥发送协议,由于Ad Hoc网络的特性现有协议都不适用.针对这一问题,提出了一个基于身份的Ad Hoc网络门限密钥发送协议,采用门限秘密共享技术实现系统私钥的分布式生成,并且利用盲签名机制有效地实现了通过公开信道进行密钥的安全发送.本协议中任何网络节点不能假冒用户去获得用户私钥,而且能够抵抗重放攻击、中间人攻击和内部攻击,适宜在Ad Hoc网络中使用.

关 键 词:基于身份密码  Ad  Hoc网络  密钥发送协议  秘密共享
文章编号:1671-8844(2007)05-0133-04
修稿时间:2007-01-26

Identity-based threshold key issuing protocol for Ad Hoc networks
REN Yongjun,WANG Jiandong,ZHUANG Yi,FANG Liming.Identity-based threshold key issuing protocol for Ad Hoc networks[J].Engineering Journal of Wuhan University,2007,40(5):133-136.
Authors:REN Yongjun  WANG Jiandong  ZHUANG Yi  FANG Liming
Affiliation:College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016 ,China
Abstract:Key issuing protocol is an important issue in identity-based cryptography. At present there are some key issuing protocols in ID-based cryptography;but those protocols are not applied due to the properties of the Ad Hoc networks.An identity-based threshold key issuing protocol is proposed for Ad Hoc networks, in which secret sharing is deployed to realize the distributed generation of the system's private key;and it makes use of the blind signature to ensure the secure issuing of the private keys of nodes in public channel. In proposed protocol, neither node can impersonate the users to obtain the private keys and is secure against replay, man-in-the-middle and insider attacks;and it suits for Ad Hoc networks.
Keywords:identity-based cryptography  Ad Hoc networks  key issuing protocol  secret sharing
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号