CN101820621A - Key updating method based on local information collaboration - Google Patents

Key updating method based on local information collaboration Download PDF

Info

Publication number
CN101820621A
CN101820621A CN201010034080A CN201010034080A CN101820621A CN 101820621 A CN101820621 A CN 101820621A CN 201010034080 A CN201010034080 A CN 201010034080A CN 201010034080 A CN201010034080 A CN 201010034080A CN 101820621 A CN101820621 A CN 101820621A
Authority
CN
China
Prior art keywords
node
message
trusted
party
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010034080A
Other languages
Chinese (zh)
Inventor
周贤伟
周健
吴华怡
杜利平
王建萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Science and Technology Beijing USTB
Original Assignee
University of Science and Technology Beijing USTB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Science and Technology Beijing USTB filed Critical University of Science and Technology Beijing USTB
Priority to CN201010034080A priority Critical patent/CN101820621A/en
Publication of CN101820621A publication Critical patent/CN101820621A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a key updating method based on local information collaboration, applied to the field of network information secrecy. The method does not need network synchronization, a credible center is formed by node cooperation and broadcasts a key updating material in part of channels, accept nodes carry out cooperation forwarding and the key updating efficiency of Ad hoc network in multi-channel is enhanced, therefore, the updating efficiency of the method is reduced to n from o(n), wherein n is number of frequency bands. For ensuring the security during updating, the invention provides a ring signature based on a threshold mechanism so as to protect the anonymity of a trusted third party. The technical scheme can effectively resist attack of malicious nodes to key updating process.

Description

Key updating method based on local information collaboration
Technical field
The present invention relates to multichannel Ad hoc key management and Safety Design field, particularly provide a kind of distribution not have the key updating scheme of trusted party based on local information collaboration.
Background technology
Ad hoc network can be operated in a plurality of frequency ranges by cognitive radio technology, does not disturb under registered user's the prerequisite and freely uses unauthorized frequency range effectively to improve the situation of frequency spectrum resource shortage.By cognitive engine, radio node can connect under different equipment, environment, policy and frequency range, and a kind of self-organizing, distribution, flexible and intelligent communication modes are provided.Because existing conventional wireless network agreement is to be based upon on the fixed frequency spectrum basis, therefore and be not suitable for multi channel Ad hoc network, so design safety, reliably and efficiently multichannel Ad hoc procotol is very necessary.Follow the development of this technology, at the exclusive attack of the multi channel Ad hoc network water surface of also appearing again, as main user's imitation, main user interference, spectrum management attack, control channel saturation attack, frequency spectrum switch selfish behavior, stride layer attacks, channel parasitism and key consume are attacked etc.Wherein a class is attacked particularly noticeable, such attack method is by being increased in the time delay in the frequency spectrum use, destroy efficiency of transmission, so that more attack opportunity to be provided, during consume is attacked as key, the assailant is by increasing the time delay in the frequency spectrum selection, provide more that multimachine can crack session key, stride and utilize the frequency spectrum handover delay in the layer attacks, the order of chaotic packet, reduce the efficiency of transmission of transport layer, the probability that causes retransmitting increases.So encryption technology is as the basis of the safety of wireless network, it is crucial studying and safe, efficient and feasible multichannel Ad hoc netkey management agreement is provided.An important ring in the key updating process key management four-stage, yet because the dynamic spectrum strategy of multi-channel wireless electric network, make its management be difficult to conventional wireless network, under the prerequisite of not destroying the spectrum allocation may strategy, reducing Network Synchronization and attack opportunity, is a matter of opening of multichannel Ad hoc key updating process.This paper proposes a kind of key updating method based on local information collaboration on the basis of analyzing multichannel Ad hoc network renewal process, this method not only can effectively improve update efficiency by local cooperative cooperating, and has protected the safety of trusted third party.
In conventional wireless network, if two euclidean distance between node pair satisfy transmission requirement, then can receive broadcast between node, yet in multichannel Ad hoc network, because the environment difference of radio node work, cause node to be operated in different frequency ranges, even two euclidean distance between node pair meet transmission requirement, because the difference of frequency range, the broadcast message that destination node can't the reception sources node, or need time of delay, to consult same channel.As shown in Figure 1, node (4,5,6) need switch to frequency range f 1, could communicate by letter with node 1, this process will cause time delay, and node 7 because and node 1 no common signal channel, can't communicate, yet node 7 and node 4,5 have common signal channel f 3And f 4, can connect between them.
Provide the definition of the blind state of radio node thus: if distance is less than maximum transmission distance between two node A and B, and the working frequency range of node A and B is different, i.e. f A≠ f B, claim that then A is that Node B is at frequency range f BUnder blind node, otherwise Node B is that node A is at frequency range f AUnder blind node.The blind state that two kinds of forms are arranged in multichannel Ad hoc network: (1) non-interference mode is the blind state of main user job frequency range as the user, has avoided main user's communications is disturbed; (2) spatial reuse of node, as shown in Figure 1, node 1,2,3,12 working frequency range are f 1, f 1, f 2, f 2, node the 12, the 3rd, node 1,2 is at frequency range f 1Under blind node, same node the 1, the 2nd, node 3,12 is at frequency range f 2Under blind node, two pairs of nodes can be set up glitch-free communicating to connect under identical space-time.Though the blind condition improvement of node the service efficiency of frequency spectrum, yet prolonged network delay, to node 2,3,12 broadcasts, need wait node 3,12 to switch to frequency range f as node 1 1Therefore the blind state of node has also disturbed the efficient of key updating, and node can not be accepted updating message simultaneously.
If allow the node of blind state accept key updating message, just must with the sending node negotiated channel.Yet negotiations process not only faces stationary problem, and negotiations process also certainly will reduce the time of transfer of data, has increased the disturbed chance of node, allows all nodes or most of node work in similar frequency bands in multichannel Ad hoc network, is difficult.Existing solution has:
A plurality of nodes are formed trusted third party, broadcast updating message on all channels.The needed time delay of this method is δ | f Max-f Min|, δ is a time delay factor.As can be seen from the above equation, the bandwidth of time delay and frequency spectrum is linear, and the frequency spectrum scope of application is wide more, and then time delay is big more.When trusted third party's node and node communicate, need to support synchronously, destroyed the flexibility that the node frequency spectrum uses, and believable third party can both be attacked on each channel.Therefore this method value is applicable to the multichannel Ad hoc network that number of frequency bands is less.
Radio node is consulted identical channel with the third party jointly by control channel.It is difficult consulting unified channel in all nodes of network, and is subjected to main user's interference easily.Though the less control channel that utilizes, saturated channel attack still can be organized key updating process, and negotiations process has simultaneously increased offered load.
Using control channel to carry out updating message sends, method above this method is similar, different is that this method does not need the channel negotiations process, though reduced time delay, yet the preciousness of control channel, and the defective that very easily is subjected to saturated channel attack, make this method can not guarantee the stability of key updating process.
The key updating process of node cooperative cooperating sends key updating message by trusted third party's selection portion frequency-division section, transmits this message by the node that receives key updating message on untapped frequency range.This method does not need the channel negotiations process, also need not the support of control channel, the time delay that trusted third party is spent on frequency spectrum switches is limited, node still can freely be selected frequency range in renewal process, can not cause interference, guarantee the flexibility of node, owing to select local channel at random main user, therefore reduced by the possibility of saturated channel attack, even the carrying out that also can't stop key updating process takes place to attack simultaneously.
Summary of the invention
Topology of networks is Ad hoc, node evenly distributes, and scale is N, and trusted third party's number of nodes is M, available number of frequency bands is that H and distribution are uniform, agreement is used the beginning of a field identification renewal process of control channel, and control channel immobilizes, and data channel can arbitrarily switch, the internodal communication of trusted third party is safe, each node has two antennas, and one is used to send message, and one is used to accept message.
Set up the local information collaboration cooperative model, node is divided into accepts more new material node (accept nodes) and new material node (not accept nodes) more not, hereinafter to be referred as recipient and not recipient, the node number that each node can transmit in each stage is λ.Constantly this two category node of t proportion in total node is remembered respectively and is made s (t) and i (t).Each node from frequency range switch in the next frequency range effectively that the more new node of transmission is a constant, be called the stage turnover rate.When the recipient when the recipient is not at same frequency spectrum, new material becomes the recipient to make not the recipient accept more.According to hypothesis, each recipient can make the individual regenerator of acceptance of λ s (t) become the regenerator in per stage, because having accepted the user of updating message is Ni (t), thus the total individual not regenerator of λ Ns (t) i (t) of each stage be updated, so λ Nsi be exactly more new node count N iIncrement rate, promptly have:
N di dt = λNsi
Again because: s (t)+i (t)=1
Remember initial time again, base station transmission information receives more that the user's of new material ratio is i 0, then
di dt = λi ( 1 - i ) , i ( 0 ) = i 0
Can obtain the key updating model
i ( t ) = 1 1 + ( 1 i 0 - 1 ) e - λt
Can analyze by above formula and to obtain when the i=1/2 time,
Figure G2010100340804D00044
In the moment of the maximum of key updating speed just, this is constantly
Figure G2010100340804D00045
By this model analysis, improve i 0Update time can be shortened with λ.Notice also that simultaneously the number of nodes that received renewal when network 1/2 when following, follows new speed to be in the increase state all the time in the network And when more the ratio of new node surpassed 1/2, the speed of renewal descended
Figure G2010100340804D00047
Therefore make fast that more the quantity occupation rate of new node reaches 1/2, can effectively reduce update time.
Can obtain algorithm design thought from above analysis, the broadcast key of base station by a plurality of data channels be new material more, and the node cooperative cooperating that receives key material is transmitted to the node that does not receive this material.For reducing the effect of base station in key updating, time cost just, because after obtaining the key updating material above the half node, turnover rate will descend, the effect of base station reduces, so the concluding time is obtained key with new for 1/2 node is arranged in network.Switching by intermediate node replaces the frequency spectrum of base station to switch the delay that has reduced key updating.Reduce the time of base station, can freely choose the frequency spectrum of broadcasting, do not needed base station and internodal negotiation synchronization mechanism.Because its flexibility has higher fail safe, but need authenticate forwarding information.Though newspaper higher turnover rate, can not guarantee obtaining of whole nodes, therefore need compensation mechanism, make the node that does not at the appointed time obtain key information initiatively obtain key updating information.
Part trusted third party node is broadcasted updating message on a plurality of channels of random choose, after the node of half is accepted message, go off the air.The updating message that the node cooperative cooperating obtains from a plurality of data channels.When surpassing fixed time threshold value t mAfter, stop the forwarding of updating message.Trusted third party's node is counted N and number of available channels H according to node, calculates t mIf the number of nodes on each frequency range is identical, N/H node then arranged, on each channel if at interval t mIn, make the number of nodes of accepting message in the network surpass 50%, then the number of times that switches at least is n, satisfies following formula:
N ( 1 + n ) n H ≥ N 2
Calculate: t m = δ ( 2 H + 1 - 1 2 ) .
This scheme can guarantee validity, fail safe, the robustness of multichannel Ad hoc network cryptographic key updating process.
On efficient, the key updating process value needs part trusted third party node, does not need synchronization mechanism and control channel, and the time delay that trusted third party spends in key updating is Less than O (δ H).
In fail safe, because the renewal process of trusted third party is anonymous, the probability of the third party's node in renewal of the identification of assailant's success is 1/m, since the assailant is difficult to discern all trusted third party's nodes, then the key updating process also is difficult to stop.Even the part of nodes in trusted third party's node is identified and is broken, need only its quantity less than k, the assailant still can not destroy key updating process.Node also can't be forged updating message, and node is after accepting message SM, by ring signature authentication (ringverify (z, a, b, s 1, s 2..., s m, c 1, c 2..., c mIts legitimacy true) is judged by)==, however this process node and do not know the source of this message.Simultaneously, because privacy key is based upon on this difficult problem of discrete logarithm, also be difficult therefore to cracking of privacy key.
On robustness, even the broadcast channel that the prediction of assailant's success is all and all trusted third party's nodes, yet because each node uses the order of channel is at random, so the saturated channel attack of initiation that the assailant also can't be successful, therefore also can't stop the broadcasting of key updating message.The anonymity of trusted third party's node, and the randomness that channel uses has all increased the attack difficulty, the subparticipation of trusted third party's node simultaneously, also guaranteed when trusted third party's number of nodes of initiating renewal process is less than threshold value, by activating new trusted third party node, the life cycle of having improved renewal process.
Agreement KUSLIC describes:
The node set U={U of trusted third party 1, U 2..., U m, m>k.Each node uses E1Gamal method secret to hold an exclusive key fragment, and establishing secret fragment is x i, f=1,2 ..., m, verification public key is
Figure G2010100340804D00062
PKI is
Figure G2010100340804D00063
A (x) ∈ Z P[x] is a K order polynomial at random, Z PBe the addition cyclic group of mould p, two hash function H 1: 0,1} *→ Z qAnd H 2: 0,1} *→ G, and 0,1} mBinary string for any bit length.Node (the U of trusted third party i, the issue of 1≤f≤l) PKI
Figure G2010100340804D00064
Part of nodes quantity in the trusted third party be l (agreement KUSLIC is described below for l≤m), cooperation signature, and broadcasting updating message:
Step 1: by the updating message of trusted third party's node issue through authentication, particular content is certain node U of trusted third party SThe broadcasting updating message, expressly be m ∈ 0,1} *→ G, PKI is
Figure G2010100340804D00071
Select a random number k ey ∈ RZ P, updating message is a (a=g Key, key ∈ RZ P)) and b (b=mh Key);
Step 2: receiving node is preserved the content of upgrading, and particular content is except U S, each receiving node calculates d
Figure G2010100340804D00072
) and preserve this value;
Step 3: the part of nodes by trusted third party is signed to updating message, and this message is sent broadcast transmission, and particular content is as follows, each node U lComprise U SCarry out following steps, with to message (b=mh Key, a 1={ g Key| l=s},
Figure G2010100340804D00073
) sign, export signature information SM (z, a, b, s at last 1, s 2..., s m, c 1, c 2..., c m);
(a) node U lCalculate Y=H 2(y 1, y 2..., y n),
(b) node U lSelect a plurality of random numbers: r, s i, c iRZ q, 1≤i≤m, i ≠ l;
(c) node U lCalculate
Figure G2010100340804D00075
Figure G2010100340804D00076
(i=1,2 .., l-1, l+1, m);
(d) node U lCalculate u l=g r, v l=z r
(e) node U lCalculate
Figure G2010100340804D00077
s l=r-c lx l
(f) node U lObtain SM l
SM l = z , a 1 , b , s 1 , s 2 , . . . , s m , c 1 , c 2 , . . . , c m , U l = U s z , a 2 , b , s 1 , s 2 , . . . , s m , c 1 , c 2 , . . . , c m , U l ≠ U s
Step 4: each node statistics has sent the frequency range of updating message and for sending the frequency range of message, particular content is set
Figure G2010100340804D00079
With the frequency range set, gather FH as 2={ f i, i=1,2 ..., H} is as not gathering with frequency range.Each node U lAt selected channel set
Figure G2010100340804D000710
Last broadcasting SM l, l=1,2 ... l, and calculate FH 1=FH 1+ { f j, FH 2=FH 2-{ f j;
Step 5: each node is collected the set of updating message, when updating message surpasses threshold value, and if satisfy the signature requirement, then satisfying more new demand, node is new key more, and it thes contents are as follows, and each node is held a massage set SMS, and the starting stage To preserve message SM.When node receives message SM NewAfter, if this message is legal and S set MS in do not have this message, then preserve, the message checking is as follows:
( a ) ∀ SM l ∈ SMS , z ∈ SM l , z new ∈ SM new ⇒ z new ≠ z ;
(b) calculate h=H 2(y 1, y 2..., y n),
Figure G2010100340804D00083
Figure G2010100340804D00084
And checking
Figure G2010100340804D00085
Step 6: node will agree that the message upgraded sends from the frequency range of random choose, and it thes contents are as follows, and node is in the frequency range set of random choose
Figure G2010100340804D00086
Broadcast SM New, and calculate FH 1=FH 1+ { f i, FH 2=FH 2-{ f i;
Step 7: node recovers the plaintext that upgrades keying material by surpassing in a plurality of message of threshold value, particular content is as follows, as overtime threshold value t mAfter, each node selects k message SM to recover expressly from massage set SMS, carries out key updating process, if the quantity of SM is less than k, then collaborative neighbor node carries out message request;
Step 8: the network operation.
Description of drawings:
Fig. 1: the blind state of node
Fig. 2: renewal process
Fig. 3: execution in step
Embodiment:
Step 1: configuration node hardware module, node have two antennas;
Step 2: the scale of offline network trusted party estimation network and available frequency band quantity calculate time threshold t Update, t mAnd t Vss
Step 3: form the trusted party of network by a plurality of trusted third party node with cooperation way, each trusted party node uses E1Gamal method secret to hold an exclusive key fragment, and the issue PKI;
Step 4: by a plurality of trusted third party in this locality node makeup ring signature, so that new key is more signed;
Step 5: if the network operation time is above t Update, then issue the updating message of signing by the trusted party node;
Step 6: carry out the KUSLIC agreement, in the agreement, surpass t when update time mThe time, then the trusted party node withdraws from renewal process;
Step 7: surpass t when the running time of network trusted Centroid Vss, then use the E1Gamal method to upgrade PKI and private key fragment;
Step 8: the network operation.

Claims (2)

1. based on the key updating method of local information collaboration, it is characterized in that: radio node need not the negotiated channel process, part trusted third party node is initiated key updating process, by a plurality of channel radio updating message of trusted third party's node random choose, radio node is transmitted message after acceptance, after radio node is collected and is surpassed the message of number of thresholds, just can recover message, renewal process need not to reveal the identity information of trusted third party's node, and concrete execution in step is as follows:
Step 1: configuration node hardware module, node have two antennas;
Step 2: the scale of offline network trusted party estimation network and available frequency band quantity calculate time threshold t Update, t mAnd t Vss
Step 3: form the trusted party of network by a plurality of trusted third party node with cooperation way, each trusted party node uses ElGamal method secret to hold an exclusive key fragment, and the issue PKI;
Step 4: by a plurality of trusted third party in this locality node makeup ring signature, so that new key is more signed;
Step 5: if the network operation time is above t Update, then issue the updating message of signing by the trusted party node;
Step 6: carry out the KUSLIC agreement, in the agreement, surpass t when update time mThe time, then the trusted party node withdraws from renewal process;
Step 7: surpass t when the running time of network trusted Centroid Vss, then use El Gamal method to upgrade PKI and private key fragment;
Step 8: the network operation.
2. update method as claimed in claim 1 is characterized in that: described KUSLIC protocol step is as follows:
The node set U={U of trusted third party 1, U 2..., U m, m>k, each node use ElGamal method secret to hold an exclusive key fragment, and establishing secret fragment is x i, i=1,2 ..., m, verification public key is
Figure F2010100340804C00011
PKI is
Figure F2010100340804C00012
A (x) ∈ Z P[x] is a K order polynomial at random, Z PBe the addition cyclic group of mould p, two hash function H 1: 0,1} *→ Z qAnd H 2: 0,1} *→ G, and 0,1} mBe the binary string of any bit length, the node (U of trusted third party i, the issue of 1≤i≤l) PKI
Figure F2010100340804C00021
Part of nodes quantity in the trusted third party be l (agreement KUSLIC is described below for l≤m), cooperation signature, and broadcasting updating message:
Step 1: by the updating message of trusted third party's node issue through authentication, particular content is certain node U of trusted third party SThe broadcasting updating message, expressly be m ∈ 0,1} *→ G, PKI is
Figure F2010100340804C00022
Select a random number k ey ∈ RZ P, updating message is a (a=g KeyKey ∈ RZ P)) and b (b=mh Key);
Step 2: receiving node is preserved the content of upgrading, and particular content is except U S, each receiving node calculates
Figure F2010100340804C00023
And preserve this value;
Step 3: the part of nodes by trusted third party is signed to updating message, and this message is sent broadcast transmission, and particular content is as follows, each node U lComprise U SCarry out following steps, with to message
Figure F2010100340804C00024
Sign, export signature information SM (z, a, b, s at last 1, s 2..., s m, c 1, c 2..., c m);
(a) node U lCalculate Y = H 2 ( y 1 , y 2 , . . . , y n ) , z = h x 1 ;
(b) node U lSelect a plurality of random numbers: r, s i, c iRZ q, 1≤i≤m, i ≠ l;
(c) node U lCalculate u i = g s i y i c i , v i = Y s i z c i ( i = 1,2 . . . , l - 1 , l + 1 , m ) ;
(d) node U lCalculate u l=g r, v l=z r
(e) node U lCalculate c l = H 1 ( z , a , b , u 1 , u 2 , . . . , u m , v 1 , v 2 , . . . , v m ) - Σ i ≠ 1 c i , s l = r - c l x l ;
(f) node U lObtain SM l
SM l = z , a 1 , b , s 1 , s 2 , . . . , s m , c 1 , c 2 , . . . , c m , U l = U s z , a 2 , b , s 1 , s 2 , . . . , s m , c 1 , c 2 , . . . , c m , U l ≠ U s
Step 4: each node statistics has sent the frequency range of updating message and for sending the frequency range of message, particular content is set
Figure F2010100340804C00029
With the frequency range set, gather FH as 2={ f i, i=1,2 ..., H} is as not gathering with frequency range; Each node Ul is at selected channel set
Figure F2010100340804C00031
Last broadcasting SM l, l=1,2 ..l, and calculate FH 1=FH 1+ { f j, FH 2=FH 2-{ f j;
Step 5: each node is collected the set of updating message, when updating message surpasses threshold value, and if satisfy the signature requirement, then satisfying more new demand, node is new key more, and it thes contents are as follows, and each node is held a massage set SMS, and the starting stage To preserve message SM; When node receives message SM NewAfter, if this message is legal and S set MS in do not have this message, then preserve, the message checking is as follows:
(a)
Figure F2010100340804C00033
(b) calculate h=H 2(y 1, y 2..., y n),
Figure F2010100340804C00034
Figure F2010100340804C00035
And checking Σ i = 1 m c i = H 1 ( z , a , b , u 1 , u 2 , . . . , u m , v 1 , v 2 , . . . , v m ) ;
Step 6: node will agree that the message upgraded sends from the frequency range of random choose, and it thes contents are as follows, and node is in the frequency range set of random choose
Figure F2010100340804C00037
Broadcast SM New, and calculate
FH 1=FH 1+{f j},FH 2=FH 2-{f j};
Step 7: node recovers the plaintext that upgrades keying material by surpassing in a plurality of message of threshold value, particular content is as follows, as overtime threshold value t mAfter, each node selects k message SM to recover expressly from massage set SMS, carries out key updating process, if the quantity of SM is less than k, then collaborative neighbor node carries out message request;
Step 8: the network operation.
CN201010034080A 2010-01-14 2010-01-14 Key updating method based on local information collaboration Pending CN101820621A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010034080A CN101820621A (en) 2010-01-14 2010-01-14 Key updating method based on local information collaboration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010034080A CN101820621A (en) 2010-01-14 2010-01-14 Key updating method based on local information collaboration

Publications (1)

Publication Number Publication Date
CN101820621A true CN101820621A (en) 2010-09-01

Family

ID=42655514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010034080A Pending CN101820621A (en) 2010-01-14 2010-01-14 Key updating method based on local information collaboration

Country Status (1)

Country Link
CN (1) CN101820621A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006169A (en) * 2010-11-11 2011-04-06 西安理工大学 Ring signature method for anonymizing information based on secondary multivariate problem in finite field
CN107302438A (en) * 2017-08-07 2017-10-27 收付宝科技有限公司 A kind of private key protection method based on key updating, system and device
CN110995441A (en) * 2019-11-25 2020-04-10 武汉大学 Multi-party collaborative EdDSA digital signature generation method and medium
CN113434905A (en) * 2021-07-05 2021-09-24 网易(杭州)网络有限公司 Data sharing method and device, computer equipment and storage medium
CN113821794A (en) * 2021-09-14 2021-12-21 北京八分量信息科技有限公司 Distributed trusted computing system and method
CN114095181A (en) * 2021-11-29 2022-02-25 贵州亨达集团信息安全技术有限公司 Threshold ring signature method and system based on state cryptographic algorithm
CN114299694A (en) * 2021-12-31 2022-04-08 郑州大学 Intelligent water conservancy wireless early warning system based on ZigBee technology
CN114338093A (en) * 2021-12-09 2022-04-12 上海大学 Method for transmitting multi-channel secret information through capsule network

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006169A (en) * 2010-11-11 2011-04-06 西安理工大学 Ring signature method for anonymizing information based on secondary multivariate problem in finite field
CN102006169B (en) * 2010-11-11 2012-09-05 西安理工大学 Ring signature method for anonymizing information based on secondary multivariate problem in finite field
CN107302438A (en) * 2017-08-07 2017-10-27 收付宝科技有限公司 A kind of private key protection method based on key updating, system and device
CN107302438B (en) * 2017-08-07 2020-10-30 吕文华 Private key protection method, system and device based on key updating
CN110995441A (en) * 2019-11-25 2020-04-10 武汉大学 Multi-party collaborative EdDSA digital signature generation method and medium
CN113434905A (en) * 2021-07-05 2021-09-24 网易(杭州)网络有限公司 Data sharing method and device, computer equipment and storage medium
CN113821794A (en) * 2021-09-14 2021-12-21 北京八分量信息科技有限公司 Distributed trusted computing system and method
CN113821794B (en) * 2021-09-14 2023-08-18 北京八分量信息科技有限公司 Distributed trusted computing system and method
CN114095181A (en) * 2021-11-29 2022-02-25 贵州亨达集团信息安全技术有限公司 Threshold ring signature method and system based on state cryptographic algorithm
CN114095181B (en) * 2021-11-29 2023-11-21 贵州亨达集团信息安全技术有限公司 Threshold ring signature method and system based on cryptographic algorithm
CN114338093A (en) * 2021-12-09 2022-04-12 上海大学 Method for transmitting multi-channel secret information through capsule network
CN114338093B (en) * 2021-12-09 2023-10-20 上海大学 Method for transmitting multi-channel secret information through capsule network
CN114299694A (en) * 2021-12-31 2022-04-08 郑州大学 Intelligent water conservancy wireless early warning system based on ZigBee technology

Similar Documents

Publication Publication Date Title
Muhammad et al. Survey on existing authentication issues for cellular-assisted V2X communication
Manvi et al. A survey on authentication schemes in VANETs for secured communication
CN101820621A (en) Key updating method based on local information collaboration
Nait Hamoud et al. Security in device‐to‐device communications: a survey
US20180278625A1 (en) Exchanging message authentication codes for additional security in a communication system
CN104737572B (en) To the method and apparatus based on neighbouring service discovery offer integrity protection of the discovery range of extension
US9473941B1 (en) Method, apparatus, and computer program product for creating an authenticated relationship between wireless devices
Nyangaresi et al. Efficient group authentication protocol for secure 5G enabled vehicular communications
CN101741566B (en) Method for entity authentication based on secret sharing encryption
Safdar et al. Common control channel security framework for cognitive radio networks
CN109152065A (en) A kind of safe method of network entry of industry wireless network multinode based on IPv6
Ben‐Othman et al. IBC‐HWMP: a novel secure identity‐based cryptography‐based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11 s
CN108882238A (en) A kind of lightweight rotation ca authentication method in mobile ad hoc network based on common recognition algorithm
Jiang et al. Wireless access in vehicular environment
Sharma Wireless sensor network security
Zahariev et al. A review on the main characteristics and security vulnerabilities of the wireless communication technologies in the Industry 4.0 domain
CN1917422A (en) Implementation method for reducing amount of calculation for managing cipher key of MANET network
Sun et al. Securing network access in wireless sensor networks
Khan et al. The cost of security: Performance of zigbee key exchange mechanism in an 802.15. 4 beacon enabled cluster
Misic et al. Performance implications of periodic key exchanges and packet integrity overhead in an 802.15. 4 beacon enabled cluster
CN108882232B (en) Authentication code embedded message transmission method between Internet of things devices
Nasiraee et al. A new three party key establishment scheme: Applicable for internet-enabled sensor networks
Gafencu et al. Security issues in the Internet of vehicles
Zhong Wi-fi protected access (WPA)
Haghighi et al. Securing wireless sensor networks against broadcast attacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100901