{"title":"Non-Centralized Key Pre-Distribution in Computer Networks","authors":"Alexander Frolov, I. Shchurov","doi":"10.1109/DepCoS-RELCOMEX.2008.47","DOIUrl":null,"url":null,"abstract":"The technology of confidential connections in a computer network using key information pre-distributed independently and may be simultaneously in its segments or domains is proposed. Some key pre-distribution schemes are generalized using well-known hashing method. To support the proposed technology the modification of Kerberos-type protocol is considered. The proposal allows us to decrease an amount of secret key information that should be sent from its generator to the network participants. The considered approaches and key pre-distribution schemes correspond to peculiarities of mobile networks owing to the facts that participants should'n implement asymmetric cryptographic systems and the public key certification service; moreover the communication phase don't suppose any interconnection with trusted authority key distribution center.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.47","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The technology of confidential connections in a computer network using key information pre-distributed independently and may be simultaneously in its segments or domains is proposed. Some key pre-distribution schemes are generalized using well-known hashing method. To support the proposed technology the modification of Kerberos-type protocol is considered. The proposal allows us to decrease an amount of secret key information that should be sent from its generator to the network participants. The considered approaches and key pre-distribution schemes correspond to peculiarities of mobile networks owing to the facts that participants should'n implement asymmetric cryptographic systems and the public key certification service; moreover the communication phase don't suppose any interconnection with trusted authority key distribution center.