Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi...
详细信息
The problems of existing authentication frameworks are analyzed, and a universal authentication protocol is proposed for the multi-domain. Moreover, entity authentication for cross-domain is supported in the protocol....
详细信息
The problems of existing authentication frameworks are analyzed, and a universal authentication protocol is proposed for the multi-domain. Moreover, entity authentication for cross-domain is supported in the protocol. Especially, by using the modular approach under the Canetti-Krawczyk model, the security of entity authentication is analyzed. It is shown that the proposed protocol is secure and could achieve the security requirements, and the protocol is a secure and fast authentication with high expansibility. This protocol can be applied to the authentication between the networks which use the difference authentication frameworks.
Semi-fragile watermarking technique which aims to discriminate malicious manipulations from admissible manipulations, is drawing many attentions in image authentication. In this paper, a novel semi-fragile image water...
详细信息
In order to avoid the flaw of the secret shadow distribution method in the existing secret sharing schemes, a secret shadow distribution method is proposed with the ID-based public key technology integrated, which use...
详细信息
In order to avoid the flaw of the secret shadow distribution method in the existing secret sharing schemes, a secret shadow distribution method is proposed with the ID-based public key technology integrated, which uses the participant's private key as his master shadow. Firstly, security analyses are made on Zheng's signcryption scheme, which shows his scheme does not offer forward secrecy. Then, an improvement is made on Zheng's signcryption scheme and a new scheme is proposed. Based on the proposed signcryption scheme and the ID-based public key cryptosystem, a new threshold multi-secret sharing scheme is proposed. The problem of the secret shadow distribution is well resolved, and no information exchange is needed between the secret dealer and each participant in advance. The secret shadow distribution can be processed during the secret distribution. At the same time, the proposed scheme offers forward secrecy. That is to say, even if the private key of the secret dealer is exposed, the security of the shared secrets will not be threatened. Therefore, the proposed ID-based secret sharing scheme is more secure and effective than others, and it can be more applicable.
Motivated by a key agreement scheme proposed by Leighton and Micali (LM-KDS), we present a key establishment mechanism for heterogeneous sensor networks which combines random key pre-distribution schemes and LM-KDS. U...
详细信息
Many P2P software have the similar communication patterns with computer worms, thus they will bring in false positives for behaviour based worm detection. Up to now, little work is done on the research of the similari...
详细信息
To estimate the trust value in P2P networks, an autonomous trust mode based on both direct experiences and recommendations is proposed, in which the recommendation synthetic coefficients are decided by the trustor'...
详细信息
To estimate the trust value in P2P networks, an autonomous trust mode based on both direct experiences and recommendations is proposed, in which the recommendation synthetic coefficients are decided by the trustor's trust on the recommendation subscribers. Both the direct trust and the recommendation trust are attenuated with time intervals. The corresponding data structure and an iterative computational method are given.
This short paper presents practical algorithms for mitigating inefficiency in reliability differentiation service based on geographical stateless routing, which has great potential applications in large scale wireless...
详细信息
This paper analyzed the security threats and systemflaws of present key management ***(t,n)threshold cryptography and key management,wepresent a threshold key management scheme based onECC( Elliptic Curve Cryptosystem...
详细信息
This paper analyzed the security threats and systemflaws of present key management ***(t,n)threshold cryptography and key management,wepresent a threshold key management scheme based onECC( Elliptic Curve Cryptosystem ).By utilizingsecret key sharing and probabilistic encryptionalgorithm in key management,the scheme achievesthreshold management of symmetric key and publickey certificate,avoids the relevance between differentcertificates generated by the same CA(CertificateAgency)or KDC(key Distribution Center).Thescheme avoids the misuse of certificate generation andanonymity of CA/KDC members,effectively preventscoalition attack,intruder-in-middle attack andgeneralized certificate *** analyses andcomparison with other key management schemes alsojustify the scheme's brevity,security,high efficiency,and thus considerable improvement on systemefficiency regarding software and ***,the scheme is most applicableto such circumstances as with restricted computationability,integrated space and limited bandwidth yetrequiring for high-speed operation.
暂无评论