An efficient key management scheme for pervasive computing

被引:0
|
作者
Ge, H [1 ]
机构
[1] Univ N Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
关键词
key management; key exchange; strong RSA assumption; pervasive computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we propose a variant of RSA public key scheme, called '' Hidden Exponent RSA ''. Based on this new scheme. we devised an efficient key distribution/management scheme for secure communication among devices in the context of pervasive computing, with emphasis on the simplicity and efficiency of the protocol. We show the new scheme is secure under the strong RSA assumption.
引用
收藏
页码:657 / 661
页数:5
相关论文
共 50 条
  • [1] A distributed trust management scheme in the pervasive computing environment
    Sun, Tao
    Denko, Mieso K.
    [J]. 2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1219 - 1222
  • [2] A new energy efficient target detection scheme for pervasive computing
    Trinh, Thanh Hai
    Youn, Hee Yong
    [J]. COMPUTATIONAL SCIENCE - ICCS 2006, PT 4, PROCEEDINGS, 2006, 3994 : 1 - 8
  • [3] An efficient scheme for applying software updates in pervasive computing applications
    Kolomvatsos, Kostas
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 128 : 1 - 14
  • [4] An Efficient Key Distribution Scheme in Cloud Computing
    Tang, Chumming
    Wong, Duncan S.
    Hu, Xing
    Pei, Dingyi
    [J]. 2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [5] SAOTS: A new efficient server assisted signature scheme for pervasive computing
    Bicakci, K
    Baykal, N
    [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 187 - 200
  • [6] An Efficient Quantum Key Management Scheme
    Vishal
    Taruna, S.
    [J]. 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 269 - 277
  • [7] An efficient key management scheme for WSN
    Hu, Liu Jian
    Wei, Jiang Jian
    [J]. 2010 INTERNATIONAL CONFERENCE ON THE DEVELOPMENT OF EDUCATIONAL SCIENCE AND COMPUTER TECHNOLOGY, 2010, : 405 - 407
  • [8] An efficient key updating scheme for multicast key management
    Yang, ZK
    Xu, SZ
    Tan, YM
    [J]. NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS II, PTS 1 AND 2, 2005, 5626 : 1096 - 1104
  • [9] A joint communication and computing resource management scheme for pervasive grid networks
    Tarchi, Daniele
    Tassi, Andrea
    Fantacci, Romano
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2013, 13 (14): : 1309 - 1323
  • [10] A Key Management and Vulnerable area Detection scheme for Secure Pervasive Environments
    Oh, Hayoung
    Chae, Kijoon
    [J]. THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1107 - +