首页 | 本学科首页   官方微博 | 高级检索  
     

Ad Hoc网络基于身份的密钥管理方案
引用本文:刘培顺,王学芳,兰顺国.Ad Hoc网络基于身份的密钥管理方案[J].计算机工程,2008,34(22):150-152.
作者姓名:刘培顺  王学芳  兰顺国
作者单位:1. 中国海洋大学计算机科学系,青岛,266071
2. 青岛大学计算机科学系,青岛,266071
基金项目:国家自然科学基金资助项目“移动Ad Hoc网络保密与认证技术研究”(60672102)
摘    要:在基于身份的Ad Hoc网络密钥管理的方案中,根据用户身份生成用户密钥时无法对用户的身份真实性进行有效确认,针对这一问题,该文结合基于身份的密码系统和基于口令的认证技术,给出一个密钥管理方案,该方案通过口令技术实现节点身份的认证,使用基于身份的密钥管理系统完成密钥的安全分发。同时基于ROM 模型证明了该方案的安全性。

关 键 词:Ad  Hoc网络  基于身份的密码系统  密钥协商  密钥认证
修稿时间: 

ID-based Key Management Scheme in Ad HOC Networks
LIU Pei-shun,WANG Xue-fang,LAN Shun-guo.ID-based Key Management Scheme in Ad HOC Networks[J].Computer Engineering,2008,34(22):150-152.
Authors:LIU Pei-shun  WANG Xue-fang  LAN Shun-guo
Affiliation:(1. Department of Computer Science, Ocean University of China, Qingdao 266071; 2. Department of Computer Science, Qingdao University, Qingdao 266071)
Abstract:Identity-Based Cryptographic(IBC) schemes are considered to secure Ad Hoc networks due to their efficient key management properties. However, proposed schemes do not provide efficient mechanisms for identity authentication. In order to solve this problem a new key management scheme is promoted combining with identity-based and password authentication in this paper. The peer identity is identified by password in Ad Hoc networks. It shows that identity-based key management schemes are effective and efficient for key distributing. The formal proof of its security is presented based on the ROM model.
Keywords:Ad Hoc networks  ID-Based Cryptography(IBC)  key agreement  key authentication
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号