吉林大学学报(工学版) ›› 2012, Vol. 42 ›› Issue (增刊1): 322-326.

• 论文 • 上一篇    下一篇

适于移动Ad hoc网络通信的多域签密算法

李志敏, 徐馨, 李存华   

  1. 淮海工学院 计算机工程学院,江苏 连云港 222005
  • 收稿日期:2012-03-12 出版日期:2012-09-01 发布日期:2012-09-01
  • 作者简介:李志敏(1981-),女,讲师,博士.研究方向:密码学,信息安全,网络安全.E-mail:min1981@gmail.com
  • 基金资助:

    江苏省自然科学基金项目(BK20082140);淮海工学院引进人才科研启动基金项目(KQ10121);淮海工学院校内课题项目(KX10530).

Multi-domain signcryption algorithm for communication of mobile Ad hoc networks

LI Zhi-min, XU Xin, LI Cun-hua   

  1. School of Computer Engineering, Huaihai Institute of Technology, Lianyungang 222005, China
  • Received:2012-03-12 Online:2012-09-01 Published:2012-09-01

摘要: 针对移动Ad hoc通信中的安全问题,利用双线性对的优点,结合基于身份加密体制,设计了一个存在多个私钥生成中心的签密算法,适合多域Ad hoc网络使用。基于计算Diffie-Hellman问题困难的假设下,在随机预言模型中证明了算法的安全性。方案设计简单,效率高,能够满足Ad hoc网络安全需求。

关键词: 计算机应用, Ad hoc网络, 签密, 可证明安全, 双线性对, 随机预言模型

Abstract: In order to insure the security of communication in mobile Ad hoc networks, a new signcryption scheme with multiple private key generators was proposed. The proposed scheme was based on bilinear pairing and identity cryptography, it is suitable for multi-domain Ad hoc networks. Under the assumption that the computational Diffie-Hellman is difficult, the security of the scheme has been proved under the random oracle model. It is concluded that the proposed scheme satisfies the security requirements of Ad hoc networks and has less computation and storage requirements.

Key words: computer application, Ad hoc networks, signcryption, provably secure, bilinear pairings, random oracle model

中图分类号: 

  • TP309.7
[1] Zheng Y. Digital signcryption or how to achieve cost(signature&encryption)cost(signature)+cost(encryption)[C]//Advances in Cryptology, LNCS. Berlin: Springer, 1997:165-179.

[2] Shamir A. Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology, LNCS. Berlin: Springer, 1984: 47-53.

[3] Boneh D, Franklin M K. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003, 32(3):586-615.

[4] Li Fa-gen, Hu Yu-pu, Zhang Chuan-rong. An identity-based signcryption scheme for multi-domain ad hoc networks[C]//Applied Cryptography and Network Security, LNCS. Berlin: Springer, 2007: 373-384.

[5] Kim H, Song J, Yoon H. A practical approach of ID-based cryptosystem in ad hoc networks[C]// Wireless Communications and Mobile Computing. USA: IEEE, 2011: 909-917.

[6] Deng H, Agrawal D P. TIDS: threshold and identity-based security scheme for wireless ad hoc networks[J]. Ad Hoc Networks, 2010,2(3): 291-307.

[7] Li J F, Wei D W, Kou H Z. Identity-based and threshold key management in mobile ad hoc networks[C]//International Conference on Wireless Communications, Networking and Mobile Computing. USA: IEEE, 2009: 1-4.

[8] Kamat P, Baliga A, Trappe W. An identity-based security framework for VANETs[C]//VANET'11. USA: IEEE, 2011: 94-95.

[9] 余旺科,马文平,严亚俊,等. Ad Hoc网络单向安全路由协议[J]. 吉林大学学报:工学版,2011,41(1): 193-197. Yu Wang-ke, Ma Wen-ping, Yan Ya-jun, et al. Unilateral secure routing protocol for Ad Hoc networks[J]. Journal of Jilin University (Engineering and Technology Edition), 2011, 41(1): 193-197.

[10] Chen L, Kudla C. Identity based authenticated key agreement protocols from pairing[C]//16th IEEE Computer Security Foundations Workshop. USA: IEEE, 2003: 219-233.

[11] Kim S, Lee H, Oh H. Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment[C]//Information and Communications Security, LNCS. Berlin: Springer, 2005: 323-335.

[12] Lee H, Kim D, Kim S,et al. Identity-based key agreement protocols in a multiple PKG environment[C]//Computational Science and Its Applications, LNCS. Berlin: Springer, 2005:877-886.
[1] 刘富,宗宇轩,康冰,张益萌,林彩霞,赵宏伟. 基于优化纹理特征的手背静脉识别系统[J]. 吉林大学学报(工学版), 2018, 48(6): 1844-1850.
[2] 王利民,刘洋,孙铭会,李美慧. 基于Markov blanket的无约束型K阶贝叶斯集成分类模型[J]. 吉林大学学报(工学版), 2018, 48(6): 1851-1858.
[3] 金顺福,王宝帅,郝闪闪,贾晓光,霍占强. 基于备用虚拟机同步休眠的云数据中心节能策略及性能[J]. 吉林大学学报(工学版), 2018, 48(6): 1859-1866.
[4] 赵东,孙明玉,朱金龙,于繁华,刘光洁,陈慧灵. 结合粒子群和单纯形的改进飞蛾优化算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1867-1872.
[5] 刘恩泽,吴文福. 基于机器视觉的农作物表面多特征决策融合病变判断算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1873-1878.
[6] 欧阳丹彤, 范琪. 子句级别语境感知的开放信息抽取方法[J]. 吉林大学学报(工学版), 2018, 48(5): 1563-1570.
[7] 刘富, 兰旭腾, 侯涛, 康冰, 刘云, 林彩霞. 基于优化k-mer频率的宏基因组聚类方法[J]. 吉林大学学报(工学版), 2018, 48(5): 1593-1599.
[8] 桂春, 黄旺星. 基于改进的标签传播算法的网络聚类方法[J]. 吉林大学学报(工学版), 2018, 48(5): 1600-1605.
[9] 刘元宁, 刘帅, 朱晓冬, 陈一浩, 郑少阁, 沈椿壮. 基于高斯拉普拉斯算子与自适应优化伽柏滤波的虹膜识别[J]. 吉林大学学报(工学版), 2018, 48(5): 1606-1613.
[10] 车翔玖, 王利, 郭晓新. 基于多尺度特征融合的边界检测算法[J]. 吉林大学学报(工学版), 2018, 48(5): 1621-1628.
[11] 赵宏伟, 刘宇琦, 董立岩, 王玉, 刘陪. 智能交通混合动态路径优化算法[J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] 黄辉, 冯西安, 魏燕, 许驰, 陈慧灵. 基于增强核极限学习机的专业选择智能系统[J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] 傅文博, 张杰, 陈永乐. 物联网环境下抵抗路由欺骗攻击的网络拓扑发现算法[J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] 曹洁, 苏哲, 李晓旭. 基于Corr-LDA模型的图像标注方法[J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] 侯永宏, 王利伟, 邢家明. 基于HTTP的动态自适应流媒体传输算法[J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!