首页 | 本学科首页   官方微博 | 高级检索  
     

基于签密的Ad Hoc网络密钥管理
引用本文:李光松,韩文报. 基于签密的Ad Hoc网络密钥管理[J]. 计算机工程与应用, 2005, 41(12): 160-164,167
作者姓名:李光松  韩文报
作者单位:信息工程大学信息研究系,郑州,450002;信息工程大学信息研究系,郑州,450002
基金项目:国家自然科学基金资助项目(编号:19971096,90104035)
摘    要:AdHoc网络可以不依赖于现有网络基础设施,快速搭建起一个移动通信网络。然而它的灵活特性又使其安全性面临着严峻的挑战。文章首先分析了AdHoc网络的安全性,然后回顾了AdHoc网络安全性关键技术———密钥管理的研究现状,接着基于签密方案和门限密码方案给出一种新的AdHoc网络密钥管理方案。方案中不需要公钥证书的存在,用户以自己的身份标识作为公钥,极大地降低了用户终端计算、存储能力的需求和系统密钥管理的通信开销,而且可以实现用户的身份认证和私钥的周期性更新。

关 键 词:Ad Hoc网络  密钥管理  基于身份的密码体制  门限密码体制  签密
文章编号:1002-8331-(2005)12-0160-05

Signcryption-Based Key Management in Ad Hoc Networks
Li Guangsong,Han Wenbao. Signcryption-Based Key Management in Ad Hoc Networks[J]. Computer Engineering and Applications, 2005, 41(12): 160-164,167
Authors:Li Guangsong  Han Wenbao
Abstract:Ad hoc networking can quickly put up a wireless mobile communication network without conventional network infrastructures.However,its flexible characteristics make security a chanllege.This paper first analyzes security of ad hoc networks,then makes a survey of the recent works about the crucial technique,key management for ad hoc networks security.A new scheme of key mangement is proposed based on signcryption and threshold cryptograph.In this scheme,public key certificates are not needed and every participant can use his ID as his public key.It greatly decreases the need of the ability for computing and storage of clients' terminals,as well as communication cost for system key management.Identities of participants can be authenticated and the private key of a participant can be updated periodically.
Keywords:Ad hoc networks  key management  identity-based cryptograph system  threshold cryptograph  signcryption  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号