Font Size: a A A

The Distributed Key Management Scheme And Its Applications

Posted on:2015-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:W J RuanFull Text:PDF
GTID:2348330518478672Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The development trend of the modern Internet is mainly manifested on mobile intelligent devices(such as wearable watch,Google glasses,etc),electronic instant payment platform,020 applications,and tele-medicine.These will evolve into distributed networks based on mobile terminals.The information security problem of mobile Internet is increasingly prominent.Ctrip "holes","Prism" event,CSDN data leakage and "black box",are all wake-up calls for modern system architects and technology developers.In this paper,starting from the actual characteristics of the network,we find out the limitations of existing schemes.The forms of node activities can be divided into two categories.Respectively,we put forward the Fully Self-organizing key management scheme(FSO)and multil level multil secrets sharing scheme based on CRT.MANET is a typical representative of distributed network.Free nodes are with no organization and a high degree of autonomy.The topology of the network is dynamical.Nodes affected by the carrier may move at any time.And with limited energy they can only send the signals for a period of time.They are vulnerable to external forces.The traditional key management mechanisms based on CA and based on the identity of nodes are not suitable for this kind of network.FSO in mobile ad hoc networks is both certificateless and free from any trusted third party such as Certificate Authority or Key Generation Center.The scheme allows a node to set up the public/private key pair all by itself and use the public key as its network identity.On the basis of this mechanism this paper shows three kinds of application protocols:encryption,signature,and signcryption.In these algorithms,the AdvancedEnc encryption algorithm's ability to resist various attacks is detailed.As a result,AdvancedEnc is proved to be able to resist the IND-CCA attack under the random oracle machine model.The performance of Signature algorithm is expounded from two angles.Nodes may not be just limited to one-on-one activities.Group collaboration is also an important way of activitys.If the system wants to establish a session key or some temporary short messages within the group,secret sharing technology is an ideal tool.Asumth-Bloom once made the Chinese remainder theorem used to threshold secret sharing,but the ability to resist the enemy attack is very fragile.In chapter 4,We first put forward multil secrets sharing scheme MLMSS based on Asumth-Bloom's scheme.For secrets which have not been recovered,its security won't be affected by the secrets recoved.MLMSS on the one hand will ensure the confidentiality and reuseability of the original secret shares.On the other hand,it can adapt to the dynamic demand of security level.MLMSS is proved to be asymptotic perfectly secure when against external attack.Strong portability and scalability make MLMSS be able to realize identity-related multi-secret sharing and group-oriented signature as two kinds of group applications.In this paper,there are three innovation points:First,designed certificateless and fully self-organization key management scheme in which a node's public key is used as its network identity;Second,implemented multi secret sharing with different security levels technology based on Chinese Remainder Theorem;Third,realize identity-related multi-secret sharing among groups and group-oriented signature application technology.
Keywords/Search Tags:Distributed network, MANET, key management, The Chinese Remainder Theorem, threshold secret sharing
PDF Full Text Request
Related items