Distribution method of threshold keys of mobile Ad hoc network

A mobile ad hoc network and threshold key technology are applied in the mobile ad hoc network threshold key distribution, the mobile ad hoc network threshold key distribution is safe and efficient, and the cryptographic field for realizing secure communication in the mobile ad hoc network can solve the problem of cryptographic techniques. Can not meet the requirements of mobile ad hoc network key management, do not make full use of joint services, high computing and transmission costs

Inactive Publication Date: 2011-10-19
AIR FORCE UNIV PLA
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, like other existing threshold key management methods for mobile ad hoc networks, in order to obtain the required private key component from the service node, the node must contact at least t of its one-hop neighbor service nodes, and this The first requirement cannot always be guaranteed "at any time and anywhere", because it is impractical and difficult to require each node to find at least t one-hop neighbor service nodes; second, each of the t nodes will generate The private key component is sent to the private key requesting node separately, and the service requesting node must interact with t PKG nodes separately. This method does not fully utilize the advantages of joint service provision; third, the storage and transmission of key information i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distribution method of threshold keys of mobile Ad hoc network
  • Distribution method of threshold keys of mobile Ad hoc network
  • Distribution method of threshold keys of mobile Ad hoc network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Now in conjunction with embodiment, accompanying drawing, the present invention will be further described:

[0044] In order to realize the object of the present invention, the method that this embodiment takes can be divided into as follows:

[0045] 1. Multiple signcryption based on identity and bilinear pairing:

[0046] A cryptographic algorithm that realizes the secret and authenticated transmission of multiple secret information by multiple people, including the following steps:

[0047] Step A: The trusted third party PKG (Private Key Generator) selects the system parameters of the algorithm. This algorithm is based on identity and bilinearity. The user's public key is the user's identity information ID or information generated by identity information: phone number, email address, IP address, etc., and the Tate pair or Weil pair on the elliptic curve is selected as bilinear transformation. PKG selects the system private key, generates the system public key, ge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a distribution method of threshold keys of a mobile Ad hoc network (MANET). The method is characterized in that: a multiple signcryption algorithm, which is based on identity and is suitable for safety requirements of an MANET, is provided; and then the multiple signcryption algorithm is applied to key management of the MANET, and a safe and high-efficient distribution method of the threshold keys of the MANET is provided. According to the invention, a multiple signcryption technology is employed. Therefore, reliability of threshold key management of the MANET is increased; the problem that a node of a service requestor is required to have a plurality of neighboring service nodes with a jogging step in the prior art can be solved; the key distribution that is carried out jointly by service nodes is allowed; and thus the safety and the high efficiency of threshold key distribution of the MANET can be ensured well.

Description

technical field [0001] The invention relates to a method for distributing a threshold key of an ad hoc network, belonging to the technical field of wireless network security, and relates to a cryptographic technology for realizing secure communication of an ad hoc network, in particular to a method for safely and efficiently distributing a threshold key of an ad hoc network. Background technique [0002] Mobile Ad hoc Network (MANET, Mobile Ad hoc Network) is a new type of wireless network, which is a multi-hop, distributed autonomous communication system composed of a group of mobile terminals with wireless communication devices. In this kind of network, two terminals that cannot communicate directly due to the limited wireless communication coverage, communicate with the forwarding of other terminal nodes in the network, so this kind of network is also called multi-hop wireless network. With its advantages of fast networking, strong adaptability, and low cost, it has been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W84/18H04L9/32H04L9/30H04W12/0431
Inventor 张串绒
Owner AIR FORCE UNIV PLA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products