计算机科学 ›› 2015, Vol. 42 ›› Issue (12): 229-232.
任方,郑 东
REN Fang and ZHENG Dong
摘要: 安全的深空通信网络是实现深空探测的重要保证之一。研究了基于天基网的深空网络体系结构,给出了一种安全通信机制。该机制采用基于属性的公钥加密算法来实现安全的深空数据传输。深空节点为数据选择加密属性集,用户能够解密密文当且仅当该加密属性集满足用户持有的访问树。该方案中用户与深空节点之间无需进行身份认证,大大减少了信息交互次数,比较适用于深空网络通信,以弥补其数据传输代价高昂的缺陷。
[1] 欧阳自远,李春来,邹永廖,等.深空探测的进展与我国深空探测的发展战略[J].中国航天,2002(12):28-32 Ouyang Z Y,Li C L,Zou Y L,et al.Advances in deep space exploration and the development strategy of China’s deep space exploration [J].Aerospace China,2002(12):28-32 [2] 姜昌,黄宇民,胡勇.研究与开发天基深空通信跟踪(C&T)网的倡议[J].飞行器测控学报,1999,8(4):28-37 Jiang C,Huang Y M,Hu Y.An initiative of research and development of space-based communications and tracking(C&T) network [J].Journal of Spacecraft TT&C Technology,1999,8(4):28-37 [3] Hooke A.The interplanetary internet [J].Communication of the ACM,2001,4(9):38-40 [4] Akyildiz I F,Akan B,Chen C,et al.Interplanetary internet:state-of-the-art and research challenges [J].Computer Networks,2003,3(2):75-112 [5] Bhasin K,Hayden J L.Space Internet architecture and technologies for NASA enterprises [J].International Journal of Satellite Communications,2002,20(5):311-332 [6] Mukherjee J,Ramamurthy B.Communication technologies and architectures for space network and interplanetary internet [J].IEEE Communications Surveys & Tutorials,2013,15(2):881-897 [7] Sodnik Z,Furch B,Lutz H.Optical intersatellite communication [J].IEEE Journal of Selected Topics in Quantum Electronics,2010,6(5):1051-1057 [8] Marchese M.Interplanetary and pervasive communications [J].IEEE Aerospace and Electronic Systems Magazine,2011,6(2):12-18 [9] 林闯,董扬威,单志广.基于 DTN 的空间网络互联服务研究综述[J].计算机研究与发展,2014,51(5):931-943 Lin C,Dong Y W,Shan Z G.Research on space internetworking service based on DTN [J].Journal of Computer Research and Development,2014,51(5):931-943 [10] Wenbo M.Modern cryptography:theory and practice [M].Prentice Hall PTR,2004 [11] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Advances in Cryptology-Crypto’84.Berlin:Springer-Verlag,1984:47-53 [12] Boneh D,Franklin M.Identity-based encryption from the weil pairing[C]∥Advances in Cryptology-Crypto 2001.Berlin:Springer-Verlag,2001:213-229 [13] 郝云芳,吴静,王立炜.Boneh-Boyen_1 基于身份加密体制的安全密钥分发[J].计算机科学,2012,39(Z6):35-37 Hao Y F,Wu J,Wang L W.Secure key issuing for Boneh-Boyen1 identity-based encryption [J].Computer Science,2012,39(Z6):35-37 [14] Sahai A,Waters B.Fuzzy identity based encryption[C]∥Advances in Cryptology-EUROCRYPT 2005.Berlin:Springer-Verlag,2005:457-473 [15] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥ACM conference on Computer and Communications Security.Alexandria,USA:ACM Press,2006:89-98 [16] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥Proceedings of IEEE Symposium on Security and Privacy.Oakland,USA:IEEE Computer Society,2007:321-334 [17] Lewko A,Waters B.Decentralizing attributed-based encryption[C]∥Advances in Cryptology-EUROCRYPT 2011.Berlin:Springer-Verlag,2011:568-588 [18] Zhang Guo-yan,Liu Lei,Liu Yang.An attribute-based encryption scheme secure against malicious KGC[C]∥IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications.Liverpool,UK:IEEE Computer Society,2012:1376-1380 [19] 陈燕俐,杜英杰,杨庚.一种高效的基于属性的认证密钥协商协议[J].计算机科学,2014,41(4):150-154,7 Chen Y L,Du Y J,Yang G.Efficient attribute based authenticated key agreement protocol [J].Computer Science,2014,41(4):150-154,7 |
No related articles found! |
|