Computer Science ›› 2013, Vol. 40 ›› Issue (6): 124-127.

Previous Articles     Next Articles

Identity-based Key Management Scheme in Pervasive Computing Environments

SUN Ling and TIAN Yuan   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Considering the key management in pervasive computing environments,this paper proposed a novel identity-based key management scheme from additive elliptic curve group.It employs the secret-sharing technique to construct distributed private key generators,and designs the methods of updating private key,updating host-key shares and negotiating session key.It can achieve higher security requirements and has higher efficiency compared with available identity-based schemes.

Key words: Pervasive computing,Key management,Identity-based cryptography,Threshold mechanism

[1] 徐光祐,史元春,谢伟凯.普适计算[J].计算机学报,2003,26(9):1042-1050
[2] Park J S,Sadi M G,Kim D S,et al.A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Network[C]∥MADNES 2005.Singapore,2005:2-13
[3] Kausar F,Hussain S,Park J H,et al.A Key DistributionScheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks[C]∥IFIP International Federation for Information Processing 2007.Taipei,Taiwan,2007:745-757
[4] Ge H.An Efficient Key Management Scheme for Pervasive computing[C]∥IEEE International Conference on Multimedia.Irvine,USA,2005:657-661
[5] Moon J S,Park J H,Lee D G.Authentication and ID-Based Key Management Protocol in Pervasive environment[J].Wireless Personal Communications,2009,50(3):221-233
[6] Shamir A.Identity Based Cryptosystems and signature schemes[C]∥Proc.CRYPTO’84.New York,USA,1984:47-53
[7] Sun H,Zheng X F,Deng Z Q.An Identity-based and Threshold Key Management Scheme for Ad hoc Networks[C]∥IEEE International Conference on Networks Security Wireless Communications and Trusted Computing.Wuhan,2009:520-523
[8] Koblitz P,Menezes P,Vanstone S.The state of elliptic curvecryptography[J].Designs,Codes and Cryptography,2000,9:173-193
[9] Barreto P,Kim H,Lynn B,et al.Efficient algorithms for pairing-based cryphosystems[C]∥CRYPTO2002.California,USA,2002:354-368

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!