{"title":"移动Ad Hoc网络的分布式密钥管理","authors":"M. Al-Shurman, S. Yoo, Bonam Kim","doi":"10.1109/MUE.2008.66","DOIUrl":null,"url":null,"abstract":"Security of mobile ad hoc networks is built upon a reliable key management system to generate and distribute symmetric encryption/decryption keys for communicating parties. While central servers generate and distribute the keys in traditional wired networks, distributive key management systems are used in mobile ad hoc networks where central approaches will fail in such dynamic, high mobility networks. Threshold cryptography1 has been proposed to provide a reliable, distributive key management for networks. In an (n, t + 1) threshold system, there are n servers to provide key generation and distribution when needed for the whole network. From these n servers, any x servers (t < x les n) can co-operate and generate a key for any node. Until now, threshold cryptography has remained only a theory. No practical key management system has been proposed to use threshold cryptography that mentioned what kind of shares servers will have in common and the practical way of creating the key from these shares . In this paper, we will construct a practical (n, t + 1)-threshold key management system using maximum distance separable codes (MDS).","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Distributive Key Management for Mobile Ad Hoc Networks\",\"authors\":\"M. Al-Shurman, S. Yoo, Bonam Kim\",\"doi\":\"10.1109/MUE.2008.66\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of mobile ad hoc networks is built upon a reliable key management system to generate and distribute symmetric encryption/decryption keys for communicating parties. While central servers generate and distribute the keys in traditional wired networks, distributive key management systems are used in mobile ad hoc networks where central approaches will fail in such dynamic, high mobility networks. Threshold cryptography1 has been proposed to provide a reliable, distributive key management for networks. In an (n, t + 1) threshold system, there are n servers to provide key generation and distribution when needed for the whole network. From these n servers, any x servers (t < x les n) can co-operate and generate a key for any node. Until now, threshold cryptography has remained only a theory. No practical key management system has been proposed to use threshold cryptography that mentioned what kind of shares servers will have in common and the practical way of creating the key from these shares . In this paper, we will construct a practical (n, t + 1)-threshold key management system using maximum distance separable codes (MDS).\",\"PeriodicalId\":203066,\"journal\":{\"name\":\"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MUE.2008.66\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MUE.2008.66","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
摘要
移动自组织网络的安全性建立在可靠的密钥管理系统的基础上,该系统为通信各方生成和分发对称的加/解密密钥。在传统的有线网络中,中央服务器生成和分发密钥,而在移动自组织网络中使用分布式密钥管理系统,在这种动态、高移动性的网络中,中央方法将失败。阈值密码学1的提出是为了为网络提供可靠的分布式密钥管理。在(n, t + 1)阈值系统中,有n台服务器提供整个网络所需的密钥生成和分发。从这n个服务器中,任意x个服务器(t < x × n)可以协作并为任何节点生成密钥。到目前为止,阈值密码学仍然只是一个理论。目前还没有一个实用的密钥管理系统被提议使用阈值密码学来说明服务器将拥有什么样的共享以及从这些共享中创建密钥的实用方法。本文将利用最大距离可分离码(MDS)构造一个实用的(n, t + 1)阈值密钥管理系统。
Distributive Key Management for Mobile Ad Hoc Networks
Security of mobile ad hoc networks is built upon a reliable key management system to generate and distribute symmetric encryption/decryption keys for communicating parties. While central servers generate and distribute the keys in traditional wired networks, distributive key management systems are used in mobile ad hoc networks where central approaches will fail in such dynamic, high mobility networks. Threshold cryptography1 has been proposed to provide a reliable, distributive key management for networks. In an (n, t + 1) threshold system, there are n servers to provide key generation and distribution when needed for the whole network. From these n servers, any x servers (t < x les n) can co-operate and generate a key for any node. Until now, threshold cryptography has remained only a theory. No practical key management system has been proposed to use threshold cryptography that mentioned what kind of shares servers will have in common and the practical way of creating the key from these shares . In this paper, we will construct a practical (n, t + 1)-threshold key management system using maximum distance separable codes (MDS).