计算机科学 ›› 2017, Vol. 44 ›› Issue (6): 168-173.doi: 10.11896/j.issn.1002-137X.2017.06.028
陈少华,樊晓光,丛伟,黄金科,孙贤明
CHEN Shao-hua, FAN Xiao-guang, CONG Wei, HUANG Jin-ke and SUN Xian-ming
摘要: 基于身份的签密算法具有计算开销小的优点,适用于Ad Hoc网络的密钥管理,能有效确保消息的机密性和认证性。针对现有基于身份的签密算法的不足,以低负载、可扩展性强、高连通性的网格为逻辑结构,提出了一种高效的基于网格的签密算法,并将其应用于Ad Hoc网络的密钥管理中,降低了系统密钥管理的通信代价和计算代价。经分析表明,在随机预言机模型下该签密算法是安全的,相应的密钥管理方案比传统方案更安全高效,网络的抗攻击能力更强。
[1] RAMANATHAN R,REDI J.A brief overview of mobile AdHoc networks:Challenges and Directions[J].IEEE Communications Magazine 50th Anniversary Commemoratives Issue,2002,0(5):20-26. [2] ZHENG Y.Digital signcryption or how to achieve cost (signature & encryption)cost (signature)+cost (encryption)[C]∥Advances in Cryptology,LNCS.Berlin:Springer,1997:165-179. [3] LI J,ZHAO J,ZHANG Y.Certificateless online/offline signcryption scheme[J].Security and Communication Networks,2014,8(11):1979-1990. [4] LI Z H,FAN K,LI H.Efficient multiple signcryption scheme based on two hard problems[J].Journal of Beijing University of Posts and Telecommunications,2013,6(6):23-26. [5] LI F G,HU Y P,ZHANG C R.An identity-based signcryption scheme for multi-domain ad hoc networks[C]∥ACNS 2007,LNCS 4521.2007:373-384. [6] KIM H,SONG J,YOON H.A practical approach of ID-based crypto system in ad hoc networks[C]∥Wireless Communications and Mobile Computing.2007:909-917. [7] DENG H,AGRAWAL D P.TIDS:threshold and identity-based security scheme for wireless ad hoc networks[J].Ad Hoc Networks,2004,2(3):291-307. [8] LI J F,WEI D W,KOU H Z.Identity-based and threshold key management in mobile ad hoc networks[C]∥International Conference on Wireless Communications,Networking and Mobile Computing 2006WiCOM 2006).2006:1-4. [9] ZHANG C R,ZHANG Y Q,LI F G,et al.New signcryption algorithm for secure communication of ad hoc networks[J].Journal on Communications,2010,1(3):19-24.(in Chinese) 张串绒,张玉清,李发根,等.适于ad hoc网络安全通信的新签密算法[J].通信学报,2010,1(3):19-24. [10] ZHOU L D,HASS Z J.Securing ad hoc networks[J].IEEE Network,Special Issue on Network Security,1999,3(6):24-30. [11] LIU Z Y,MAO S L.A new secure group key managementscheme for ad hoc networks[J].Control & Automation,2006,22(12):3-4.(in Chinese) 刘知远,毛胜利.一个新的ad hoc安全组密钥管理方案[J].微计算机信息,2006,2(12):3-4. [12] ZHANG Q Y,MIAO F M,YUAN Z T,et al.Identity-basegroup key management scheme in ad-hoc[J].Journal on Communication,2009,0(10A):85-92.(in Chinese) 张秋余,苗丰满,袁占亭,等.基于身份的Ad Hoc组密钥管理方案[J].通信学报,2009,0(10A):85-92. [13] ZHANG Y,DU R Y,CHEN J,et al.Analysis and improvement of an identity-based signcryption[J].Journal on Communications,2015,6(11):174-179.(in Chinese) 张宇,杜瑞颖,陈晶,等.对一个基于身份签密方案的分析与改进[J].通信学报,2015,6(11):174-179. [14] BONEH D,FRANKIN M.Identity based encryption from Weil pairing[C]∥Kilian JCRYPTO2001.Berin:SpringerVerlag,2001:213-229. [15] MALONE-LEE J.Identity based signcryption[EB/OL].http://eprint.iacr.org/2002/098. [16] CHEN L,MALONE-LEE J.Improved identity-based signcryption[M]∥Public Key Cryptography-PKC 2005.Springer Berlin Heidelberg,2005:362-379. [17] LIBERT B,QUISQUATER J.A new identity based signcryption scheme from pairings[C]∥IEEE Information Theory Workshop.2003:155-158. [18] BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[J].SIAM Journal on Computing,2003,2(3):586-615. |
No related articles found! |
|