An anonymous distributed key management system based on CL-PKC for space information network
Y Liu, A Zhang, J Li, J Wu - 2016 IEEE international conference …, 2016 - ieeexplore.ieee.org
Y Liu, A Zhang, J Li, J Wu
2016 IEEE international conference on communications (ICC), 2016•ieeexplore.ieee.orgThe space information network (SIN) has attracted more and more attention due to its
extensive applicability and great expanding access services. The complicated properties of
SIN, such as the dynamic and unstable topology, the highly exposed links and so on, make it
necessary to design an appropriate key management scheme to ensure the security of
communication. In this paper we propose an anonymous and distributed certificate-less key
management scheme (aCL-KMS) for SIN. It mainly adopts the strategy of the distributed key …
extensive applicability and great expanding access services. The complicated properties of
SIN, such as the dynamic and unstable topology, the highly exposed links and so on, make it
necessary to design an appropriate key management scheme to ensure the security of
communication. In this paper we propose an anonymous and distributed certificate-less key
management scheme (aCL-KMS) for SIN. It mainly adopts the strategy of the distributed key …
The space information network (SIN) has attracted more and more attention due to its extensive applicability and great expanding access services. The complicated properties of SIN, such as the dynamic and unstable topology, the highly exposed links and so on, make it necessary to design an appropriate key management scheme to ensure the security of communication. In this paper we propose an anonymous and distributed certificate-less key management scheme (aCL-KMS) for SIN. It mainly adopts the strategy of the distributed key generation, update and agreement instead of the complex centralized key management. Based on the certificate-less public key cryptosystem (CL-PKC), this scheme not only avoids the high cost of complicated certificate management, but also overcome the key-escrow problem of the certificate-based or identity-based public key cryptosystem. Also, due to the fact that the anonymous authentication mechanism adopts the temporary identification of members, this scheme can efficiently protect the members' privacy and ensure the confidentiality of communications. The security properties discussion and the computational overhead analysis show that the proposed key management system is secure enough to meet the security requirements of SIN, and it is of less computing cost at the same time.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果