Font Size: a A A

Spk Key System And The Secret Distribution Protocol, Since The Security Of Ad Hoc Networks

Posted on:2006-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhongFull Text:PDF
GTID:2208360182960372Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Information Security is an all-round and crossed researching field in the military cryptology. Cryptogram technology is its kernel, and key manage- ment is one of the key points in the cryptogram technology. By the research to key management, this article combines the SPK with the IBE and design an encryption system based on them. The system can avoid complex processes of CA authentication, save the space of storage and generate pairs of keys quickly, then it can be used widely; To work for key management, based on the secret sharing scheme and threshold cryptology, the article provides a new protocol named Add-Ring Protocol to solve the new member's subsecret secure distributing problem in the self-secure Ad-hoc network. By analysising the protocol, it can be known that it is ([K/2] security, and more efficient onthe computational amount than the extisting protocols. So it can satisfy the requests ofcommunication in the circumstance of field operation.
Keywords/Search Tags:Information Security, key management, SPK, IBE, secret sharing scheme, (k,n) threshold cryptology scheme
PDF Full Text Request
Related items