Font Size: a A A

Design And Application Of Key Management Protocol Of Forward Security

Posted on:2013-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:J T HuangFull Text:PDF
GTID:2248330374486726Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Ad-hoc network is a distributed multi-hopping network (without center).Itstopology structure is constantly changing and is vulnerable to attack. So, traditional keymanagement system is not adaptive. Secret sharing system supplies an efficient methodfor key management in tactic network.Secret sharing is an important technique in key management, which prevents secretfrom excessively centralizing. Secret sharing technique efficiently disperses risk ofsystem by dividing secret information into secret shares. In threshold scheme of secretsharing, only attacker obtains successfully enough secret shares, can he reconstructsecret information successfully? Because of these properties of secret sharing, secretsharing technique is particularly applicable to key management in Ad-hoc network. But,there exist some potential risks in secret sharing scheme. Therefore, provably securesecret sharing scheme and proactive secret sharing scheme are suggested so thatcheating problem among members can be solved. In these schemes, public keycryptosystems are used. Public key authentication technique based on identificationencryption algorithm uses identity as public key, so, there does not revision problem ofpublic key management. That cost is low, form is flexible, efficiency is high and it isapplicable to Ad-hoc network is its advantage.Based on proactive secret sharing scheme, we design a forward secure keymanagement scheme which has characteristic that shared key and key shares areupdated with time period. In forward secure key management protocol,combingproperty of Ad-hoc network with security requirement, we study key managementscheme in which non-center and member dynamically changing are supported. The keymanagement scheme is applicable to wireless non-reliable chains and tacticalenvironment.On the basis of secret sharing, combing idea of forward secure digital signature, wedesign identity-based, forward secure shared key management protocol. Then, we applythis protocol to key management in Ad-hoc network. Its security is much higher thanthat of traditional key management mode. In this paper, starting off with relative background of subject research,we firstdescribe in detail relative theory of secret sharing and forward secure digital signature.Then, we analyze some technique schemes of proactive secret sharing. At last, combingproperty of Ad-hoc network with security requirement, we design forward secure keymanagement protocol and present its applied scheme.
Keywords/Search Tags:Key Management, Secret sharing, forward security, Ad-hoc, IBE
PDF Full Text Request
Related items