Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Add to Favorite Get Latest Update

An Improved Reparable Key Distribution Protocol

LI Hu,CHEN Huang hai,ZHU Hong wen (Department of Electronic Engineering,Shanghai Jiao Tong University,Shanghai 200030,China)  
Hwang and Ku introduced a concept of reparability feature into key distribution protocol.In this paper,the key distribution protocol,proposed by Hwang and Ku,is analyzed.This paper also presentes security problems in Hwang and Ku′s protocol,and furthermore,the argument on whether the protocol has the perfect reparability feature.So,an improved reparable key distribution protocol is proposed in this paper,which solves these security problems.A method,hiding the duplicated event markers,is also proposed and is applied in the protocol to successfully solve the perfect reparability problem.
【CateGory Index】: TN9181
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 3 Hits
1 Zhao Xingwen Li Fei Li Hui (Key Lab of Ministry of Education on Co mputer Network and Information Secu rity,Xidian University,Xi ' an 710071);Designing Secure LAN Using IEEE 802.10Standard[J];Communications Technology;2003-11
2 WANG Wen-long1,2,WANG Ze-cheng1,3,LI Zhi-bin1,SI Tao-zhi1,4 (1. Institute of Network Information Security,East China Normal University, Shanghai 200062, China; 2. Department of Computer Science, Kashgar Teachers College, Kashgar 844007, China; 3. Network Center, Anhui Institute of Finance and Trade, Bengbu 233041, China; 4. Information Institue, Second Industrial University, Shanghai 200062, China);A new key distribution protocol for Internet environments[J];Journal of China Institute of Communications;2004-02
3 HE Ming-xing(School of Mathematics and Computer Engineering,Xihua University,Chengdu 610039 China);Study on Intrusion Resilient Key Management with Time Properties and Its Advance[J];Journal of Xihua University(Natural Science Edition);2010-02
Chinese Journal Full-text Database 10 Hits
1 Liu Jianwei;Wang Yumin;Xiao Guozhen(National Key Lab.of ISDN,Xidian Univ.,Xi'an 710071);A Protocol for Authentication of Mobile User Based on KryptoKnight[J];ACTA ELECTRONICA SINICA;1998-01
2 Xu Sheng bo; and Wang Xinmei (Xidian Univ,Xi’an 710071);Authenticated Conference Key Distribution Scheme and Secure Broadcast Scheme with the Capability to Correct Errors[J];ACTA ELECTRONICA SINICA;1998-01
3 QING Si-han,MENG Yang,LIU Ke-long (Institute of Software,The Chinese Academy of Sciences,Engineering Research Center for Information Security Technology,The Chinese Academy of Sciences,Beijing 100080,China);Key Management for Multilevel Security in Distributed Applications[J];Acta Electronica Sinica;2001-02
4 GUO Yuan-bo 1,2,MA Jian-feng 1 (1.The Ministry of Education Key Laboratory of Computer Networks and Information Security,Xidian University,Xi'an,Shaanxi 710071,China; 2.School of Electronic Technology,Information Engineering University of PLA,Zhengzhou,Henan 450004,China);Proactive Secret Sharing in Asynchronous Networks with Unreliable Links[J];Acta Electronica Sinica;2004-03
5 PENG Wen-ling 1,2,WANG Li-na1,ZHANG Huan-guo1,FU Jian-ming1(1.School of Computer,State Key Laboratory of Software Engineering,Wuhan University,Wuhan,Hubei 430079,China;2.Network Center,Gannan Teachers College,Ganzhou,Jiangxi 341000,China);Research on Intrusion Tolerant Architecture Based on Role-Based Access Control[J];Acta Electronica Sinica;2005-01
6 Yang Yixian(Beijing University of Posts and Telecommunications,Beijing);NEW SCHEMES FOR IDENTITY-BASED KEY DISTRIBUTION[J];;1989-01
7 Wang Yongchuan Li Zichen Yang Yixian (Beijing University of Posts and Telecommunications, Beijing 100876);A SECRET KEY DISTRIBUTIONS SCHEME BASED ON THE THEORY OF ALGEBRAIC SEMIGROUPS[J];;2000-03
8 LU Hai-jun,SU Yun-xue,ZHU Yue-fei(Department of Network Engineering,Information Engineering College,Information Engineering University,Zhengzhou,Henan 450002,China);A Distributed Random Key Distribution System with Distributed Characteristics of Space and Time[J];Acta Electronica Sinica;2005-01
9 XU Qiu Liang and LI Da Xing (Department of Computer Science, Shandong University, Jinan 250100) (Institute of Network Security, Shandong University, Jinan 250100);ELLIPTIC CURVE CRYPTOSYSTEMS[J];JOURNAL OF COMPUTER RESEARCH AND DEVELOPMENT;1999-11
10 TENG Meng, ZOU Peng, and WANG Huai Min (School of Computer Sciences, National University of Defense Technology, Changsha 410073);A Proactive Secret Sharing Algorithm[J];Journal of Computer Research and Development;2003-07
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved