首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Complex Threshold Key Management for Ad Hoc Network
作者姓名:GUOWei  XIONGZhong-wei  LIZhi-tang
作者单位:[1]CollegeofComputerScienceandTechnology,HuazhongUniversityofScienceTechnology,Wuhan430074,Hubei,China [2]StateKeyLaboratoryofSoftwareEngineering,WuhanUniversity,Wuhan430072,Hubei,China
基金项目:SupportedbytheStateInformationSecurityCenter2004Research(1917C021)
摘    要:A complex threshold key management framework has been proposed, which can address the challenges posed by the unique nature of Ad hoe network. Depending on the cooperation of the controller and participation nodes, this scheme should be efficient in the operation environmental alteration and tolerant faults of node, which take the advantages of the benefits of both key management approaches and alleviate their limitations. For the cooperation of the controller and participation nodes, a (t,n) threshold Elliptic curve sign-eneryption scheme with the specified receiver a/so has been proposed. Using this threshold signencryption scheme, the key management distributes the trust between a controller and a set of participation nodes.

关 键 词:密钥管理  Ad-hoc网络  域值密码  信息安全  计算机网络安全
收稿时间:18 May 2004

Complex threshold key management for ad hoc network
GUOWei XIONGZhong-wei LIZhi-tang.Complex Threshold Key Management for Ad Hoc Network[J].Wuhan University Journal of Natural Sciences,2005,10(1):132-136.
Authors:Guo Wei  Xiong Zhong-wei  Li Zhi-tang
Institution:(1) College of Computer Science and Technology, Huazhong University of Science Technology, 430074 Wuhan, Hubei, China;(2) State Key Laboratory of Software Engineering, Wuhan University, 430072 Wuhan, Hubei, China
Abstract:A complex threshold key management framework has been proposed, which can address the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation of the controller and participation nodes, this scheme should be efficient in the operation environmental alteration and tolerant faults of node, which take the advantages of the benefits of both key management approaches and alleviate their limitations. For the cooperation of the controller and participation nodes, a (t, n) threshold Elliptic curve sign-encryption scheme with the specified receiver also has been proposed. Using this threshold sign-encryption scheme, the key management distributes the trust between a controller and a set of participation nodes.
Keywords:key management  Ad hoc network  threshold cryptography  communication security
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号