共查询到20条相似文献,搜索用时 109 毫秒
1.
针对现有的基于多项式的密钥预分配管理方案受限于节点间密钥共享率和网络连通率等问题,文中提出了一种基于二次型的无线传感器密钥管理方案.该方案突破现有二元t次对称多项式建立共享密钥的思路,引入多元非对称二次型多项式,利用二次型特征值与特征向量之间的关系,分析证明二次型正交对角化的特性,生成密钥信息,节点则通过交换密钥信息实现身份认证,生成与邻居节点之间独立唯一的会话密钥.性能分析表明,与现有的密钥管理方案相比,方案在抗俘获性、连通性、可扩展性、通信开销和存储开销上有较大的改进. 相似文献
2.
本文提出一种基于多项式的WSN密钥管理方案.基站通过计算节点秘密信息构成的多项式来生成网络的全局密钥,节点通过全局密钥可以认证网络中的合法节点.节点用全局密钥经过对称多项式密钥交换来生成与簇头节点之间的会话密钥.该方案能够动态更新密钥,从而解决了由于节点被捕获所导致的信息泄露、密钥连通性下降和密钥更新通信开销大等问题.性能分析表明,该方案与现有的密钥预分配方案相比,具有更低的存储开销、通信开销、良好的扩展性和连通性. 相似文献
3.
4.
5.
6.
基于单向函数的多级密钥共享方案 总被引:10,自引:0,他引:10
本文在Harn于1995年指出的一个多级密钥(t,n)-门限密钥共享方案的基础上,给出了两个新的多级密钥(t,n)-门限密钥共享方案,该方案能够检测欺骗者。 相似文献
7.
8.
本文提出了一种基于ElGamal公钥算法和(t,n)门限的密钥恢复方案.它将要托管的密钥K分成n份并交给n个托管代理保管,当需要恢复时,任何t个代理托管的子密钥均可以恢复密钥K,而任何少于t个代理托管的子密钥均无法恢复.在密钥和子密钥的传送过程中,采用了ElGamal算法和ECC算法作校验,分两个阶段实现,提高了安全性和灵活性. 相似文献
9.
基于随机信号流的密钥生成方案会在合法发送方发送随机信号时泄露部分共享随机源信息导致密钥安全性和可达密钥速率较低。针对此问题,该文提出一种基于多随机信号流的密钥生成方案。首先,发送方利用信道互易性和上行导频估计下行信道,然后发送方在各天线上发送相互独立的随机信号流。由于窃听者难以准确估计所有随机信号流,因此难以窃取接收方每根天线接收到的叠加随机信号,而发送方则可根据估计的下行信道和自身发送的随机信号流计算出接收方各天线的接收信号。因此,可以将接收天线上的叠加随机信号作为共享随机源提取密钥。进一步地,该文还推导了该方案的可达密钥速率和共享随机源的互信息量表达式,并分析了两者间的关系以及对密钥安全性的影响。最后,通过仿真验证了该方案的有效性,仿真结果表明该方案能够有效降低窃听者观察到的共享随机源互信息,从而提升可达密钥速率及密钥安全性。 相似文献
10.
移动自组网的组密钥链更新算法 总被引:1,自引:0,他引:1
针对移动自组网拓扑结构变化频繁,组密钥更新频率高,计算次数多,通信量巨大的特点,提出了一种新的组密钥管理算法-分布式组密钥链更新算法(DKCGR).基于密钥链和左/右向性密钥结构设计了DKCGR算法.通过相邻节点生成共享密钥建立一条循环的密钥链和向左或者向右方向生成若干共享密钥,完成组密钥的更新.同时,借鉴LKH的树形密钥方案,将密钥链用4叉树表示.实验结果表明:DKCGR算法随着加入节点的增多其计算次数将是一个常数,有效控制计算量.与传统的LKH相比节约了n/2(n指节点数)次通信量. 相似文献
11.
Jamal Zarepour-Ahmadabadi MohammadEbrahim Shiri-Ahmadabadi Ali Miri AliMohammad Latif 《Wireless Personal Communications》2018,99(3):1329-1344
A multi-secret sharing scheme tries to share multiple secrets among a group of players in such a way that co-operation of pre-specified subsets of them, called access structures, can reconstruct the secrets. Existing methods allow for all secrets to be recovered at once, by the same sharing algorithm, and by identical access structures. However, in many real world applications, secrets may not needed all at once, access structure may vary for different secrets (change over time), and a group of dishonest players may collude to obtain all secrets. In this paper, we propose a novel and efficient algorithm to address these issues. Our main objectives are, to recover each secret according to its own scheme, by its own access structure, and whenever needed. Our proposed algorithm also blocks collusion attacks by dishonest players. Our scheme can work with any general purpose threshold schemes. It is also rather efficient in terms of computational and communication overhead costs. There computational costs for sharing and recovering stages are almost negligible, and communication costs of sharing and recovering are of order \({{\mathcal {O}}}(n+k)\) and \({{\mathcal {O}}}(\sum _{i=1}^{k} t^{i})\) respectively, where n is the number of players and where \(t^i\)’s are the threshold values for the k secrets. 相似文献
12.
13.
14.
In this paper, we propose a verifiable multi-secret sharing scheme. Some secrets are protected by distributing them among
many participants, whereby only an authorized group of participants can reconstruct the secrets. In our scheme, the secret
will change periodically and the dealer will periodically publish some of the information to increase the robustness of system,
in addition, the participants can verify the information which they have received. Each participant holds only one permanent,
private secret, and some of them use it during different time periods to reconstruct the corresponding shared secrets without
revealing their own private information. Because some public information is renewed in our scheme, the old information has
nothing to do with the next secret. We also compare our scheme to the same technique-based studies in the fields promoting
the benefits we achieve in this paper. 相似文献
15.
针对Chien-Jan-Tseng体制计算量大以及Yang-Chang-Hwang体制公开信息量大的不足,利用双变量单向函数提出了一个新的(t,n)门限多重秘密共享体制.通过一次秘密共享过程就可以实现对任意个秘密的共享,而参与者秘密份额的长度仅为一个秘密的长度.在秘密重构过程中,每个合作的参与者只需提交一个由秘密份额计算的伪份额,而不会暴露其秘密份额本身.本文体制结合了现有体制的优点并避免了它们的缺点,是一个实用、有效的体制. 相似文献
16.
17.
18.
Reza Ghasemi Ali Safi Massoud Hadian Dehkordi 《International Journal of Communication Systems》2018,31(1)
A multisecret sharing (MSS) is a method for sharing a set of secrets among some participants. They can recover each of these secrets without endangering the other secrets. Two kinds of security models have been proposed for MSS schemes. These models are categorized into 2 types. The first security model is unconditional security. This approach decreases the efficiency of MSS schemes. Therefore, the second type of security, which is more relaxed, appeared. This approach is called computational security. In this paper, with 2 examples, we will show that the current definition of computational security does not satisfy all of our expectations from a secure MSS scheme. In fact, in these examples, recovering a secret leaks information to the other secrets while these schemes are considered secure in view of the computational security. After determining the shortcomings of the current security definition, we propose a new definition for computational security and present an MSS scheme that enjoys rigorous proof of security in terms of the new definition. In addition, a complete comparison in terms of share size, number of public values, and required operations for recovering a secret between our scheme and previous schemes indicates that the presented scheme is efficient. 相似文献
19.
In a (t, n)-threshold multi-secret sharing scheme, several secrets are shared among n participants in such a way that any t (or more) of them can reconstruct the secrets while a group of (t − 1) can not obtain any information. Therefore, when such schemes are used to distribute sensitive information over a network,
fault tolerance property is achieved since even if n − t of the nodes go out of function, the remaining t nodes suffice to recover the information. In 2009, Wang et al. proposed a verifiable (t, n)-threshold multi-secret sharing scheme (WTS) based on elliptic curves in which the secrets can change periodically [Wireless
Pers. Commun., Springer-Verlage, doi:. In this paper, we propose a verifiable (t, n)-threshold multi-secret sharing scheme based on bilinear maps. Our scheme does not require a secure channel and participants
can verify the shares pooled in the reconstruction phase. Our proposed scheme is multi-use such that in order to change the
secrets, it is sufficient to renew some public information. Furthermore, the proposed scheme is flexible to the threshold
value. Therefore, our proposed scheme has all the merits of (WTS), however, we achieve two major improvements. First when
the secrets are to be changed, we require to publish fewer public values. This reduction can be very important in certain
applications such as steganographic use of secret sharing schemes. The second is that (WTS) is designed with the assumption
that the number of secrets (m) is equal to the threshold t so that the case m > t is handled by repeating the scheme
é \fracmt
ù{\left\lceil \frac{m}{t}\right\rceil} times. However, in designing the scheme we do not assume any restrictions on the number of secrets. 相似文献