期刊文献+

一种基于门限担保证书的分布式私钥元分配方案 被引量:3

Distributed secret share distribution scheme based on threshold warrant certificates
下载PDF
导出
摘要 由于动态拓扑等特点,Ad Hoc网络通常采用分布式CA认证模型为节点提供可靠的认证服务,但现有的方案没有解决私钥元分配之前的安全审核问题。为此,提出了一种基于门限担保证书的分布式私钥元分配方案,对申请私钥元的节点进行严格的审核,可以有效防止多个恶意节点合谋重构系统私钥,确保只有可信且服务质量好的节点能够得到私钥元。从理论上分析了方案的安全性以及成功率,并借助NS2仿真证实了方案的有效性。 Ad Hoc network often supplies reliable authentication service for nodes by distributed certificate authority authentication model due to its dynamic topology and other characteristics; however, the problem of secure auditing is not solved by existing schemes. Therefore, a distributed secret share distribution scheme was put forward based on threshold warrant certificates, which carried out strict auditing towards the nodes that applied for secret shares, and could effectively withstand several malicious nodes working together to recover the secret key of system, and make sure that only the credible and high-quality-service nodes were able to gain the secret shares. In the end, the security and success probability of the scheme were analyzed in theory, and its effectiveness was confirmed by simulations.
出处 《计算机应用》 CSCD 北大核心 2008年第6期1385-1387,1391,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60503012)
关键词 ADHOC网络 分布式 认证 私钥元 担保证书 Ad Hoc network distributed authentication secret share warrant certificate
  • 相关文献

参考文献10

  • 1SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979,22(1):612-613. 被引量:1
  • 2ZHOU L, HAAS Z. Securing Ad Hoc networks[J]. IEEE Network, 2000, 13(6):24-30. 被引量:1
  • 3KONG JIE-JUN, ZERFOS P, LUO HAI-YUN, et al. Providing robust and ubiquitous security support for mobile Ad Hoc networks [ C]// 9th International Conference on Network Protocols ( ICNP). Washington: IEEE Computer Society, 2001:251 - 261. 被引量:1
  • 4OSTROVSKY R, YUNG M. How to withstand mobile virus attacks [C]// Proceedings of the 10th ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1991:51 -59. 被引量:1
  • 5HERZBERG A, JARECHI S, KRAWCZYK H, et al. Proactive secret sharing or: how to cope with perpetual leakage [C]//Advances in cryptography-Crypto '95, LNCS 963. Berlin: Springer-Verlag, 1998:963-976. 被引量:1
  • 6DONG Y, SUN AI-FEN, YIU S M, et al. Providing distributed certificate authority service in cluster-based mobile Ad Hoc networks [ J]. Computer Communications, 2007, 30(11/12) : 2442 - 2452. 被引量:1
  • 7艾东知,Ad Hoc网分布式认证的研究[D].上海:复旦大学,2004. 被引量:2
  • 8BETTSTETTER C, WAGNER C. The spatial node distribution of the random waypoint mobility model [ C]// Proceedings of the 1st German Workshop on Mobile Ad Hoc Networks (WMAN). Ulm, Germany: GI, 2002:41-58. 被引量:1
  • 9CAMP T, BOLENG J, DAVIES V. A Survey of Mobility Models for Ad Hoc Network Research [ J]. Wireless Communication & Mobile Computing: Special issue on Mobile Ad Hoc Networking: research, Trends and Application, 2002, 2(5) : 483 - 502. 被引量:1
  • 10BECHLER M, HOF H-J, KRAFT D, et al. A cluster-based security architecture for Ad Hoc networks [ C]// 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004). Washington: IEEE Press, 2004, 4:2393-2403. 被引量:1

共引文献1

同被引文献16

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部