Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of China Institute of Communications》 2004-02
Add to Favorite Get Latest Update

A new key distribution protocol for Internet environments

WANG Wen-long1,2,WANG Ze-cheng1,3,LI Zhi-bin1,SI Tao-zhi1,4 (1. Institute of Network Information Security,East China Normal University, Shanghai 200062, China; 2. Department of Computer Science, Kashgar Teachers College, Kashgar 844007, China; 3. Network Center, Anhui Institute of Finance and Trade, Bengbu 233041, China; 4. Information Institue, Second Industrial University, Shanghai 200062, China)  
This paper introduces a new key distribution protocol based on digital signature of elliptic curve, which the event marker not to be used. The property of authentication is enhanced in this protocol. Base on this protocol, a hierarchical key distribution protocol for Internet environments is introduced.
【Fund】: 上海市科技发展基金资助项目(02JC14031)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 6 Hits
1 Zhang Yimin Duan Chenghua Wang Feijie (Graduate School of USTC,Beijing 100039);A Mendable Key Distributing Protocal in Internet Enviroment[J];计算机工程与应用;2001-18
2 LI Hu,CHEN Huang hai,ZHU Hong wen (Department of Electronic Engineering,Shanghai Jiao Tong University,Shanghai 200030,China);An Improved Reparable Key Distribution Protocol[J];电子学报;2000-10
3 YANG Jun-hui1 DAI Zong-duo2 YANG Dong-yi3 LIU Hon g-wei3 1(Institute of Software\ The Chinese Academy of Sciences\ Beijing \ 100080) 2(State Key Laboratory of Information Security\ Graduate School of Un iversity of Science and Tehnology of China\ B;An Elliptic Curve Signature Scheme and an Identity-Based Signature A greement[J];软件学报;2000-10
4 XU Qiu Liang and LI Da Xing (Department of Computer Science, Shandong University, Jinan 250100) (Institute of Network Security, Shandong University, Jinan 250100);ELLIPTIC CURVE CRYPTOSYSTEMS[J];计算机研究与发展;1999-11
5 Chang Qing Liu Zhongkan Zhang QiShan (Department of Electronic Engineering,Beijing University of Aeronautics and Astronautics,Beijing 100083);The Recurrence Algorithm for GDOP and Positioning Solution in GPS[J];通信学报;1998-12
6 Xu Shengbo Tian Jianbo Wang Xinmei(School of Communication Engineering, Xidian Univ., Xian, 710071);Design of secure authenticated key distribution protocols[J];西安电子科技大学学报;1998-04
Chinese Journal Full-text Database 10 Hits
1 XINGWEIZHE;COLLEGE OF ENGINEERING,PEKING UNIVERSITY;;Implementation of Public Key Cryptographic Algorithm SM2 based on C language[J];中国新通信;2017-18
2 ZHANG Shuguang;XIAN Hequn;LIU Hongyan;HOU Ruitao;College of Computer Science and Technology,Qingdao University;Key Laboratory of Network Assessment Technology,Institute of Information Engineering,Chinese Academy of Sciences;;Research on Encrypted Deduplication Method Based on Offline Key Transfer in Cloud Storage Environment[J];信息网络安全;2017-07
3 SONG Liang-rui;Department of Civil Engineering,Sichuan College of Architectural Technology;;Elliptic curve and optimization research based on structural engineering[J];信息技术;2016-10
4 GAO Long;TANG Chun-ming;ZHANG Yong-qiang;School of Mathematics and Information Science, Guangzhou University;Number of Times Polytron Technologies Inc.;;Multi-parties key agreement protocol based on elliptic curve[J];网络与信息安全学报;2016-05
5 XIA Ge-ming;SHI Li-zhe;ZHOU Wen;SHEN Heng-feng;Military College,National University of Defense Technology;;An Optimal Design to Lighten the Agreement of Bidirectional Identifi cation on RFID[J];信息网络安全;2014-02
6 ZHANG Jing;School of computer and communication engineering,Zhengzhou Institute of Light Industry;;Research and Implementation of Elliptic Curve Cryptography System[J];计算机安全;2013-10
7 Gao Jianming(Zhejiang Yuexiu University of Foreign Languages,College of International Business,Shaogxing,Zhejiang 312000,China);Application of elliptic curve public key in network security code system[J];计算机时代;2013-08
8 XIA Chang-qun1,YANG Shi-ping1,2(1.College of Computer Science and Information,Guizhou University,Guiyang 550025,China 2.College of Mingde,Guizhou University,Guiyang 550004,China);Performance Evaluation Based on Elliptic Curve Blind Digital Signature[J];贵州大学学报(自然科学版);2012-05
9 WANG Hong-zhen1,2,LI Zhu-lin1,2(1.Department of Computer Science,Yan'an University,Yan'an 716000,China; 2.Software R&D Center,Yan'an University,Yan'an 716000,China);Application and Security Analysis of ECC Algorithm in Software Protection[J];计算机技术与发展;2012-08
10 HAN Ran,WU Zheng-peng,HU xiao-li(College of Science,Communication University of China,Beijing 100024);A Scheme Based on the Elliptic Curve Digital Signature and Blind Signature[J];中国传媒大学学报(自然科学版);2012-02
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 XU Qiu-Liang; LI Da-Xing(Institute of Network Security. Shandong University, Jinan 250100)(Department of computer Science, Shandong University. Jinan 250100);CONSTRUCTING ELLIPTIC CURVES SUITABLE FOR CRYPTOSYSTEMS-METHODS AND IMPLEMENTATION[J];计算机学报;1998-12
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved