作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2013, Vol. 39 ›› Issue (2): 103-107. doi: 10.3969/j.issn.1000-3428.2013.02.021

• 安全技术 • 上一篇    下一篇

一种非对等的移动Ad hoc网络密钥管理方案

吴 军 a,b,石润华 a,b,仲 红 a,b   

  1. (安徽大学 a. 智能计算与信号处理教育部重点实验室;b. 计算机科学与技术学院,合肥 230039)
  • 收稿日期:2012-03-29 修回日期:2012-05-22 出版日期:2013-02-15 发布日期:2013-02-13
  • 作者简介:吴 军(1986-),男,硕士研究生,主研方向:网络与信息安全;石润华,副教授、博士;仲 红,教授、博士生导师
  • 基金资助:
    国家自然科学基金资助项目(61173188, 61173187);安徽省自然科学基金资助项目(11040606M141);安徽高校省级重点自然科学研究基金资助项目(KJ2010A009);安徽大学“211工程”基金资助项目

An Asymmetric Key Management Scheme for Mobile Ad hoc Network

WU Jun a,b, SHI Run-hua a,b, ZHONG Hong a,b   

  1. (a. Key Laboratory of Intelligent Computing & Signal Processing of Ministry of Education; b. School of Computer Science and Technology, Anhui University, Hefei 230039, China)
  • Received:2012-03-29 Revised:2012-05-22 Online:2013-02-15 Published:2013-02-13

摘要: 针对实际应用中移动Ad hoc网络节点可能存在身份差异的情况,提出一种非对等的移动Ad hoc网络密钥管理框架及一个密钥共享方案,该方案可以生成2类不同的主私钥共享份额,结合2类共享份额才能恢复主私钥。基于上述方案中的密钥配置结构,给出一个移动Ad hoc网络限制验证者的数字签名方案。分析结果表明,该方案在签名阶段需执行1次模幂运算和1次欧几里得算法,在验证阶段需执行O(t)次模幂运算,并且方案具有较好的实用性,安全性与部分分布式密钥管理签名方案相同。

关键词: 移动Ad hoc网络, 密钥管理, 数字签名, 限制验证者, 秘密共享, 欧几里得算法

Abstract: In the applications, the identity of nodes in mobile Ad hoc network may be different. According to the situation, this paper proposes an asymmetric key management framework for the mobile Ad hoc network. In order to satisfy the special framework, it designs a new secret sharing scheme for splitting the system private key, in which it generates two kinds of shares of the system private key: the special share and the ordinary share, so that it needs two kinds of shares to recover the system private key. Furthermore, it presents a limited verifier signature scheme in mobile Ad hoc network based on this secret sharing. Analysis results show that the scheme has a good availability since all nodes share the master private key and the decreases computation complexity, which is one time modular exponentiation and Euclid algorithm in signature phase, O(t) times modular exponentiation in verification phase. Besides, it is as safe as partially distributed key management sign scheme.

Key words: mobile Ad hoc network, key management, digital signature, limited verifier, secret sharing, Euclid algorithm

中图分类号: