期刊文献+

基于对等网络的即时安全通信系统设计与实现 被引量:1

Design and Realization of Instant Secure Communication System Based on Ad Hoc Network
下载PDF
导出
摘要 文中讨论了一个新的安全有效的会议密钥分配协议,该协议适合多个用户通过临时组建的对等网络实现即时安全通信。相对于GDH.2而言,此方案对通信参与者的身份以及传输数据的完整性进行了验证,而且对最后产生的会议密钥进行了确认,以增加很小的计算和通信负荷为代价,安全性能得到了较大的提高。最后,通过一套即时安全通信系统的设计和实现方法证明其可行性。 In this paper it introduced a new secure and efficient conference distribution p rotocol that is suitable for exchanging information over an Ad Hoc network. Comp ared with GDH.2, the identity of the participants and the integrality of transmi tted data are verified in the scheme, the final conference key is affirmed. More over, the security of the new protocol is greatly improved at a slight cost in c omputation and communication overheads. Finally, design and realize an instant s ecure communication system based on Ad Hoc network by using the protocol.
出处 《计算机应用》 CSCD 北大核心 2003年第5期68-70,73,共4页 journal of Computer Applications
基金 国家自然科学基金 (6 982 51 0 2 )
关键词 对等网络 即时安全通信系统 设计 群密钥协议 security conference key instant communication
  • 相关文献

参考文献7

  • 1袁丁,范平志.一个安全有效的会议密钥分配方案[J].西南交通大学学报,2002,37(4):408-412. 被引量:1
  • 2Schneier B 吴世忠 译.应用密码学-协议、算法与C源程序[M].北京:机械工业出版社,2000.. 被引量:4
  • 3Koyama K. Secure conference key distribution schemes for conspiracy[ A]. advance in Cryptology - Eurecrypt[ C]. Springer - verlag,Berlin Germany, 1992. 449 -454. 被引量:1
  • 4Hwang MS, Yang WP. Conference key distribution protocols for digital mobile communication system [ J]. IEEE J. Select. Areas Comm., 1995, 13(2) :416 -420. 被引量:1
  • 5Burmester M , Desmedt Y . A secure and efficient conference key distribution system [ A]. advance in Cryptology - Eurocrypt [ C].Springer-verlag. Berlin Germany, 1994. 275-287. 被引量:1
  • 6Burmester M, Desmedt Y. Efficient and secure confeaence key distribution[ A]. In Combridge Workshop on security protecols, volume 1189 of lecture Notes in computer science[ C]. Springer -verlag,Berlin Germany, Apr. 1996. 119 -129. 被引量:1
  • 7Steiner M, Tsudik G, Waidrer M. Diffie - Hellman key distribution extended to groups[ A]. In ACM conference computer and communication security[C]. California. ACM Press, Mar. 1996. 31-37. 被引量:1

二级参考文献10

  • 1[1]Kenji K.Secure conference key distribution schemes for conspiracy[A].In Advance in Cryptology-Eurocrypt[C].Springer-verlag,Berlin Germany,1992:449-454. 被引量:1
  • 2[2]Hwang M S,Yang W P.Conference key distribution protocols for digital mobile communication system[J].IEEE J.Select.Areas Comm.1995;13(2):416-420 . 被引量:1
  • 3[3]Burmester M,Desmedt Y.A secure and efficient conference key distribution system[A].In Advance in Cryptology-Eurocrypt[C].Springer-verlag,Berlin Germany,1994:275-287. 被引量:1
  • 4[4]Burmester M,Desmedt Y.Efficient and secure conference key distribution[A].In Combridge Workshop on Security Protocols,Volume 1189 of Lecture Notes in Computer Science[C].Springer-verlag,Berlin Germany,1996;4:119-129. 被引量:1
  • 5[5]Steiner M,Tsudik G,Waidrer M.Diffie-Hellman key distribution extended to groups[A].In ACM Conference Computer and Communication Security[C].California:ACM Press,1996;3:31-37. 被引量:1
  • 6[6]Steiner M,Tsudik G,Waidrer M.CLIQUES:A new approach to group key agreement[A].In IEEE International Conference on Distributed Computing System,Amsterdam[C].The Netherlands,1998;3:168-176. 被引量:1
  • 7[7]Ateniese G,Steiner M ,Tsudik G.Authenticated group key agreement and friends[A].In Proceedings of the 5th ACM Conference on Computer and Communication Security[C].San Francisco,CA,1998;11:164-174. 被引量:1
  • 8[8]Diffie W,Hellman M.New directions in cryptography[J].IEEE Trans.on Information Theory,1976;IT-22(6):644-654. 被引量:1
  • 9[9]Gong L.A security risk of depending on synchronized clocks[J].ACM Operating System Rev.,1992;26(1):49-53. 被引量:1
  • 10[10]Mills D L.Internet time synchronization:the network time protocol[J].IEEE Trans.Comm.,1991;39(10):1 482-1 493. 被引量:1

共引文献3

同被引文献12

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部