计算机科学技术 |
|
|
|
|
无线传感器网络中高效的基于身份的加密算法 |
贾晨军1,廖永建2,陈抗生1 |
(1.浙江大学 信息与电子工程学系, 浙江 杭州 310027; 2.电子科技大学 计算机科学与工程学院, 四川 成都 610054) |
|
Efficient identity-based encryption algorithm in wireless sensor networks |
GU Chen-Jun1, LIAO Yong-Jian2, CHEN Gang-Sheng1 |
1. Department of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China; 2. School
of Computer Science and Technology, University of Electronic Science and Technology of China, Chengdu 610054, China |
[1] LAI Bo-cheng, KIM S, VERBAUWHEDE I. Scalable session key construction protocol for wireless sensor networks [C]∥ Proceedings of IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES). Austin: IEEE, 2002.
[2] BLUNDO C, SANTIS A D, HERZBERG A, et al. Perfectly-secure key distribution for dynamic conferences [C]∥ Proceedings of CRYPTO’92. Berlin: Springer-Verlag, 1992: 471-486.
[3] ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks [C]∥ Proceedings of the 9th ACM Conference on Computer and Communications Security. New York: ACM, 2002: 41-47.
[4] CHAN Hao-wen, PERRIG A, SONG Xiao-dong. Random key predistribution schemes for sensor networks [C]∥ IEEE Symposium on Security and Privacy. Washington: IEEE, 2003.
[5] SHAMIR A. Identity-based cryptosystems and signature schemes [C]∥ Proceedings of CRYPTO’84. Berlin: Springer-Verlag, 1984: 47-53.
[6] BONEH D, FRANKLIN M K. Identity-based encryption from the weil pairing [C]∥ Proceedings of CRYPTO’01. Berlin: Springer-Verlag, 2001: 213-229.
[7] BONEH D, FRANKLIN M K. Identity-based encryption from the weil pairing [J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
[8] BONEH D, BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’04. Berlin: Springer-Verlag, 2004: 223-238.
[9] BONEH D, BOYEN X. Secure identity based encryption without random oracles [C]∥ Proceedings of CRYPTO’04. Berlin: Springer-Verlag, 2004: 443-459.
[10] WATERS B. Efficient identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’05. Berlin: Springer-Verlag, 2005: 114-127.
[11] GENTRY C. Practical identity-based encryption without random oracles [C]∥ Proceedings of EUROCRYPT’06. Berlin: Springer-Verlag, 2006: 445-464.
[12] ROMAN R, ALCARAZ C. Applicability of public key infrastructures in wireless sensor networks [C]∥ Proceedings of EuroPKI’07. Berlin: Springer-Verlag, 2007: 313-320.
[13] YANG Geng, RONG Chun-ming, CHRISTIAN V, et al. Identity-based key agreement and encryption for wireless sensor networks [J]. The Journal of China Universities of Posts and Telecommunications, 2006, 13(4): 54-60.
[14] SILVERMAN J H. The arithmetic of elliptic curves [M]. 3rd ed. Berlin: Springer-Verlag, 1994.
[15] DU Wen-liang, WANG Rong-hua, NING Peng. An efficient scheme for authenticating public keys in sensor networks [C]∥ Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing. New York: ACM, 2005: 58-67. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|