首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种基于身份的移动自组网认证机制
引用本文:陈炜,龙翔,高小鹏.一种基于身份的移动自组网认证机制[J].北京航空航天大学学报,2006,32(7):869-872.
作者姓名:陈炜  龙翔  高小鹏
作者单位:北京航空航天大学 计算机学院, 北京 100083
摘    要:针对移动自组网无公钥基础设施的特点,采用基于身份的密码学算法、分布式秘密共享算法和椭圆曲线加密算法,实现安全高效的移动节点认证.简单讨论基于身份的数字签名算法;介绍如何使用Lagrange插值公式,实现分布式的系统主密钥;然后给出节点密钥安全分发的模型,并在此模型的基础上,基于椭圆曲线加密算法实现安全的分布式节点密钥签发;给出算法安全性和效率分析;根据双线性对的特点,讨论会话密钥的产生和更新.给出的认证方法,具有分布式实现和安全高效的特点,同时可以非交互式产生一次性会话密钥,适用于分布式移动网络环境. 

关 键 词:移动自组网    秘密共享    公钥密码学    基于身份的密码学    椭圆曲线密码学
文章编号:1001-5965(2006)07-0869-04
收稿时间:2005-07-21
修稿时间:2005年7月21日

Identity-based authentication scheme for mobile ad hoc networks
Chen Wei,Long Xiang,Gao Xiaopeng.Identity-based authentication scheme for mobile ad hoc networks[J].Journal of Beijing University of Aeronautics and Astronautics,2006,32(7):869-872.
Authors:Chen Wei  Long Xiang  Gao Xiaopeng
Institution:School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
Abstract:In order to realize secure and efficient mobile node authentication in mobile ad hoc networks(MANET) which have no traditional public key infrastructure(PKI),a scheme consisting of identity-based cryptograph,distributed secrete sharing algorithm and elliptic curves encryption was proposed. Identity-based digital signature algorithm was briefly discussed.Lagrange interpolating polynomial was used to distribute master secret key among system nodes.A model describing secure node key issue was given,and a distributed procedure based on the given model was presented to securely issue node key by using elliptic curves encryption.The security and efficiency of the proposed algorithm was analyzed.According to the property of the bilinear pairing,the generation and update of session keys was discussed.The proposed authentication scheme could be used to realize efficient and secure authentication in distributed mobility scenarios,and to generate non-interactive one time session keys between two mobile nodes.
Keywords:manet  secret sharing  public key cryptography  identity-based cryptography  elliptic curves cryptography
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《北京航空航天大学学报》浏览原始摘要信息
点击此处可从《北京航空航天大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号