计算机科学 ›› 2013, Vol. 40 ›› Issue (6): 124-127.

• 信息安全 • 上一篇    下一篇

普适计算环境中基于身份的密钥管理方案

孙凌,田源   

  1. 河南商业高等专科学校 郑州450044;河南商业高等专科学校 郑州450044
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受河南省高等学校青年骨干教师资助

Identity-based Key Management Scheme in Pervasive Computing Environments

SUN Ling and TIAN Yuan   

  • Online:2018-11-16 Published:2018-11-16

摘要: 针对普适环境中的密钥管理问题,利用椭圆曲线加法群设计了一种新的基于身份的密钥管理方案。新方案利用门限秘密共享机制构建了分布式密钥生成中心,并设计了私钥更新、主密钥分量更新和会话密钥协商策略。与现有基于身份密钥管理方案相比,新方案具有更强的安全性和更高的执行效率。

关键词: 普适计算,密钥管理,基于身份的密码体制,门限机制

Abstract: Considering the key management in pervasive computing environments,this paper proposed a novel identity-based key management scheme from additive elliptic curve group.It employs the secret-sharing technique to construct distributed private key generators,and designs the methods of updating private key,updating host-key shares and negotiating session key.It can achieve higher security requirements and has higher efficiency compared with available identity-based schemes.

Key words: Pervasive computing,Key management,Identity-based cryptography,Threshold mechanism

[1] 徐光祐,史元春,谢伟凯.普适计算[J].计算机学报,2003,26(9):1042-1050
[2] Park J S,Sadi M G,Kim D S,et al.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network[C]∥MADNES 2005.Singapore,2005:2-13
[3] Kausar F,Hussain S,Park J H,et al.A Key DistributionScheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks[C]∥IFIP International Federation for Information Processing 2007.Taipei,Taiwan,2007:745-757
[4] Ge H.An Efficient Key Management Scheme for Pervasive computing[C]∥IEEE International Conference on Multimedia.Irvine,USA,2005:657-661
[5] Moon J S,Park J H,Lee D G.Authentication and ID-Based Key Management Protocol in Pervasive environment[J].Wireless Personal Communications,2009,50(3):221-233
[6] Shamir A.Identity Based Cryptosystems and signature schemes[C]∥Proc.CRYPTO’84.New York,USA,1984:47-53
[7] Sun H,Zheng X F,Deng Z Q.An Identity-based and Threshold Key Management Scheme for Ad hoc Networks[C]∥IEEE International Conference on Networks Security Wireless Communications and Trusted Computing.Wuhan,2009:520-523
[8] Koblitz P,Menezes P,Vanstone S.The state of elliptic curvecryptography[J].Designs,Codes and Cryptography,2000,9:173-193
[9] Barreto P,Kim H,Lynn B,et al.Efficient algorithms for pairing-based cryphosystems[C]∥CRYPTO2002.California,USA,2002:354-368

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!