通信学报

• 学术论文 • 上一篇    下一篇

基于(t, n)门限和划分树的可再生Hash链构造方案

黄海平1,2,4,戴庭1,2,王汝传1,2,3,秦小麟4,陈九天1   

  1. 1. 南京邮电大学 计算机学院,江苏 南京 210003;2. 江苏省无线传感网高技术研究重点实验室, 江苏 南京 210003; 3. 南京邮电大学 宽带无线通信与传感网技术教育部重点实验室,江苏 南京 210003; 4. 南京航空航天大学 计算机科学与技术学院,江苏 南京 210016
  • 出版日期:2013-04-25 发布日期:2013-04-15
  • 基金资助:
    国家自然科学基金资助项目(61170065, 61003039);江苏省科技支撑计划(工业)基金资助项目(BE2012183);江苏省属高校自然科学研究重大基金资助项目(12KJA520002);国家博士后基金资助项目(2012M511753);江苏省博士后基金资助项目(1101011B);江苏高校科技创新计划基金资助项目(CXLX12-0486);江苏高校优势学科建设工程基金资助项目(信息与通信工程, yx002001)

Novel self-renewal hash chain scheme based on (t, n) threshold and division tree

  • Online:2013-04-25 Published:2013-04-15
  • Supported by:
    The National Natural Science Foundation of China (61170065, 61003039); Scientific & Technological Support Project (Industry) of Jiangsu Province (BE2012183); The Natural Science Key Fund for Colleges and Universities of Jiangsu Province (12KJA520002); Postdoctoral Foundation of China (2012M511753); Postdoctoral Foundation of Jiangsu Province (1101011B); Science & Technology Innovation Fund for Higher Education Institutions of Jiangsu Province(CXZZ11-0486); The Priority Academic Program Development of Jiangsu Higher Education Institutions (Information & Communication Engineering, yx002001)

摘要: 针对可再生hash链解决了其资源受限的缺点,但现有构造方案在安全性和复杂性等方面存在缺陷这一问题,提出“重复”、“划分”和“划分树”的定义,以及基于(t, n)-Mignotte’s门限的中国剩余定理秘密共享方案,设计了一种新的可再生hash链构造方法。从明文空间、双重认证和可证明安全3方面论证了新构造方案能确保新链中种子值的安全再生并有效抵制中间人攻击。同时仿真实验表明新构造方案在通信、计算和存储开销等方面相比于传统方案具有相同甚至更佳的性能。

Abstract: The introduction of renewal hash chain overcame resource-constrained defect in traditional hash chains, but the existing renewable schemes had still held unsatisfactory performance especially on security and complexity. The definitions of repetition, division and division-tree was proposed, and then a novel self-renewable hash chain construction scheme was put forward based on division and (t, n)-Mignotte's threshold Chinese remainder theorem secret sharing scheme. From three aspects of key space, twice authentication and provable security, it theoretically proves that the proposed hash scheme could ensure the novel seed value regenerated safely and resisting the middle-man attack effectively. Simulation experiments demonstrate that the novel scheme obtains equal or more satisfactory performances on the costs of communication, computation and storage than typical schemes.

No Suggested Reading articles found!