A non-interactive and efficient key agreement protocol for ASNs - art. no. 67950P

被引:0
|
作者
Yang Deming [1 ]
Mu Dejun [1 ]
Xu Zhong [1 ]
机构
[1] NW Polytech Univ, Coll Automat, Xian 710072, Peoples R China
关键词
ad hoc space networks; key agreement; non-interactive; ID-based;
D O I
10.1117/12.773757
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Ad hoc space networks (ASNs) are implemented using flexible, distributed architecture consisting of constellations of dynamically deployed space, airborne and mobile platforms. The nodes within ASNs operate both as communication end-points as well as routers, enabling multi-hop wireless communication and dynamic network topology. Secure and efficient key agreement scheme is the crucial mechanism to construct secure ASNs. Previous ID-based cryptosystem is. not feasible in ASNs because of the interaction process in key agreement. A novel non-interactive and efficient ID-based two-party key agreement protocol is proposed for ASNs. Based on the security analysis of IDNIKS proposed by Tso et al., the feasibility of adopting non-interactive key agreement for multi-party in ASNs is analyzed and a conclusion is given.
引用
收藏
页码:P7950 / P7950
页数:6
相关论文
共 50 条
  • [21] Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs
    Gennaro, Rosario
    Halevi, Shai
    Krawczyk, Hugo
    Rabin, Tal
    Reidt, Steffen
    Wolthusen, Stephen D.
    COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 49 - +
  • [22] On the Security of a Non-Interactive Authenticated Key Agreement over Mobile Communication Networks
    Yau, W. C.
    Yap, W. S.
    Chin, J. J.
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2021, 15 : 77 - 89
  • [23] Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (01) : 5 - 13
  • [24] MODRED: A code-based non-interactive key exchange protocol
    Pei, Junling
    Fu, Fang-Wei
    THEORETICAL COMPUTER SCIENCE, 2024, 1021
  • [25] An efficient non-interactive deniable authentication protocol with anonymous sender protection
    Hwang, Shin-Jia
    Chao, Chien-Hung
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (03): : 219 - 231
  • [26] Non-Interactive Zero-Knowledge and applications: Two round authenticated key agreement
    Saxena, A
    Soh, B
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 722 - 726
  • [27] A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
    Pan, Menghan
    He, Daojing
    Li, Xuru
    Chan, Sammy
    Panaousis, Emmanouil
    Gao, Yun
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [28] Non-interactive multisignatures in the plain public-key model with efficient verification
    Qian, Haifeng
    Xu, Shouhuai
    INFORMATION PROCESSING LETTERS, 2010, 111 (02) : 82 - 89
  • [29] Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups
    Kumar V.
    Kumar R.
    Pandey S.K.
    International Journal of Information Technology, 2020, 12 (1) : 283 - 288
  • [30] A Practical Anti-collusion Hierarchical Identity-based Non-interactive Key Agreement for Wireless Networks
    Xing, Qianqian
    Wang, Baosheng
    Wang, Xiaofeng
    Tao, Jing
    Liu, Liu
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 89 - 95