Please wait a minute...
J4  2009, Vol. 43 Issue (8): 1396-1400    DOI: 10.3785/j.issn.1008-973X.2009.
计算机科学技术     
无线传感器网络中高效的基于身份的加密算法
贾晨军1,廖永建2,陈抗生1
(1.浙江大学 信息与电子工程学系, 浙江 杭州 310027; 2.电子科技大学 计算机科学与工程学院, 四川 成都 610054)
Efficient identity-based encryption algorithm in wireless sensor networks
 GU Chen-Jun1, LIAO Yong-Jian2, CHEN Gang-Sheng1
1. Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China; 2. School
of Computer Science and Technology, University of Electronic Science and Technology of China, Chengdu 610054, China
 全文: PDF(580 KB)   HTML
摘要:

无线传感器网络节点的通信和计算能力非常有限,使得传统的公钥加密算法无法有效应用,为此提出了一种安全的轻量级的加密算法.基于身份的密码系统简化了基于证书的密码系统繁琐的密钥管理过程,根据无线传感器网络自身的特点,对现有的基于身份的加密算法安全模型进行改进,提出了一个新的安全模型,并在此基础上提出了一种在标准模式下可证明安全的基于身份的加密算法.与现有的基于身份的加密算法相比,提出的加密算法存储需求更小、计算量更少,更加适合于无线传感器网络.

Abstract:

As the key technology of pervasive computing, wireless sensor network’s (WSN’s) node is very limited in its energy, processing power, storage capacity and communication capability, so it’s usually  considered unsuitable for the use of public key encryption technology. But the identity-based encryption (IBE) makes it possible to use public key encryption technology in WSN. IBE system simplifies the certificate management which is cumbersome in the certificate-based public key system. According to the features of WSN, the security model of IBE system was modified and an IBE system was proposed, which was proved secure in the new security model without random oracle. Comparison with previous IBE system showed that the proposed system needs less storage and is more efficient. So the proposed system is more suitable for WSN.

出版日期: 2009-09-28
:  TN 918.911  
基金资助:

国家自然科学基金资助项目(60602023).

通讯作者: 陈抗生,男,教授,博导.     E-mail: chenks@zju.edu.cn
作者简介: 贾晨军(1978-),男,青海西宁人,博士生,从事密码算法研究.
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  

引用本文:

贾晨军, 廖永建, 陈抗生. 无线传感器网络中高效的基于身份的加密算法[J]. J4, 2009, 43(8): 1396-1400.

GU Chen-Jun, LIAO Yong-Jian, CHEN Gang-Sheng. Efficient identity-based encryption algorithm in wireless sensor networks. J4, 2009, 43(8): 1396-1400.

链接本文:

http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2009.        http://www.zjujournals.com/eng/CN/Y2009/V43/I8/1396

[1] LAI Bo-cheng, KIM S, VERBAUWHEDE I. Scalable session key construction protocol for wireless sensor networks [C]∥ Proceedings of IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES). Austin: IEEE, 2002.
[2] BLUNDO C, SANTIS A D, HERZBERG A, et al. Perfectly-secure key distribution for dynamic conferences [C]∥ Proceedings of CRYPTO’92. Berlin: Springer-Verlag, 1992: 471-486.
[3] ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks [C]∥ Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM, 2002: 41-47.
[4] CHAN Hao-wen, PERRIG A, SONG Xiao-dong. Random key predistribution schemes for sensor networks [C]∥ IEEE Symposium on Security and Privacy. Washington: IEEE, 2003.
[5] SHAMIR A. Identity-based cryptosystems and signature schemes [C]∥ Proceedings of CRYPTO’84. Berlin: Springer-Verlag, 1984: 47-53.
[6] BONEH D, FRANKLIN M K. Identity-based encryption from the weil pairing [C]∥ Proceedings of CRYPTO’01. Berlin: Springer-Verlag, 2001: 213-229.
[7] BONEH D, FRANKLIN M K. Identity-based encryption from the weil pairing [J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
[8] BONEH D, BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’04. Berlin: Springer-Verlag, 2004: 223-238.
[9] BONEH D, BOYEN X. Secure identity based encryption without random oracles [C]∥ Proceedings of CRYPTO’04. Berlin: Springer-Verlag, 2004: 443-459.
[10] WATERS B. Efficient identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’05. Berlin: Springer-Verlag, 2005: 114-127.
[11] GENTRY C. Practical identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’06. Berlin: Springer-Verlag, 2006: 445-464.
[12] ROMAN R, ALCARAZ C. Applicability of public key infrastructures in wireless sensor networks [C]∥ Proceedings of EuroPKI’07. Berlin: Springer-Verlag, 2007: 313-320.
[13] YANG Geng, RONG Chun-ming, CHRISTIAN V, et al. Identity-based key agreement and encryption for wireless sensor networks [J]. The Journal of China Universities of Posts and Telecommunications, 2006, 13(4): 54-60.
[14] SILVERMAN J H. The arithmetic of elliptic curves [M]. 3rd ed. Berlin: Springer-Verlag, 1994.
[15] DU Wen-liang, WANG Rong-hua, NING Peng. An efficient scheme for authenticating public keys in sensor networks [C]∥ Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing. New York: ACM, 2005: 58-67.

No related articles found!