Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2018

01.12.2018

Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels

verfasst von: S. V. Belim, S. Yu. Belim

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A modification is presented of the scheme of preliminary Blom’s key distribution taking into account the direction of information flows. The modification makes it necessary to use a function of three variables. The function of forming key materials ceases to be symmetrical. An exponential form of this function was proposed, which does not increase the amount of key materials.
Literatur
1.
Zurück zum Zitat Shamir, A., Identity-based cryptosystems and signature schemes, Advances in Cryptology: Proceedings of CRYPTO 84; Lect. Notes Comput. Sci., 1984, vol. 7, pp. 47–53. Shamir, A., Identity-based cryptosystems and signature schemes, Advances in Cryptology: Proceedings of CRYPTO 84; Lect. Notes Comput. Sci., 1984, vol. 7, pp. 47–53.
2.
Zurück zum Zitat Boneh, D. and Franklin, M., Identity-based encryption from the Weil pairing, CRYPTO’01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, 2001, pp. 213–229. Boneh, D. and Franklin, M., Identity-based encryption from the Weil pairing, CRYPTO’01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, 2001, pp. 213–229.
3.
Zurück zum Zitat E. B. Aleksandrova, Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 947–958.CrossRef E. B. Aleksandrova, Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 947–958.CrossRef
4.
Zurück zum Zitat E. B. Aleksandrova and E. N. Shkorkina, Tripartite outsourcing key-agreement on the bilinear pairings, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 796–801.CrossRef E. B. Aleksandrova and E. N. Shkorkina, Tripartite outsourcing key-agreement on the bilinear pairings, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 796–801.CrossRef
5.
Zurück zum Zitat Lee, C.-C., Chung, P.-S., and Hwang, M.-S., A survey on attribute-based encryption schemes of access control in cloud environments, Int. J. Network Secur., 2013, vol. 15, no. 4, pp. 231–240. Lee, C.-C., Chung, P.-S., and Hwang, M.-S., A survey on attribute-based encryption schemes of access control in cloud environments, Int. J. Network Secur., 2013, vol. 15, no. 4, pp. 231–240.
6.
Zurück zum Zitat Belim, S.V. and Bogachenko, N.F., Distribution of cryptographic keys in systems with a hierarchy of objects, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776.CrossRef Belim, S.V. and Bogachenko, N.F., Distribution of cryptographic keys in systems with a hierarchy of objects, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 773–776.CrossRef
7.
Zurück zum Zitat Belim, S.V., Belim, S.Yu., and Polyakov, S.Yu., Implementation of discretionary access sharing using a modified Blom scheme for preliminary key distribution, Probl. Inf. Bezop., Komp’yut. Sist., 2015, no. 3, pp. 72–76. Belim, S.V., Belim, S.Yu., and Polyakov, S.Yu., Implementation of discretionary access sharing using a modified Blom scheme for preliminary key distribution, Probl. Inf. Bezop., Komp’yut. Sist., 2015, no. 3, pp. 72–76.
8.
Zurück zum Zitat Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 777–786.CrossRef Belim, S.V. and Belim, S.Yu., KDP scheme of preliminary key distribution in discretionary security policy, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 777–786.CrossRef
9.
Zurück zum Zitat Belim, S.V. and Belim, S.Yu., The VPN implementation on base of the KDP-scheme, CEUR Workshop Proc., 2016, vol. 1732. http://ceur-ws.org/Vol-1732/paper3.pdf. Belim, S.V. and Belim, S.Yu., The VPN implementation on base of the KDP-scheme, CEUR Workshop Proc., 2016, vol. 1732. http://​ceur-ws.​org/​Vol-1732/​paper3.​pdf.​
Metadaten
Titel
Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels
verfasst von
S. V. Belim
S. Yu. Belim
Publikationsdatum
01.12.2018
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2018
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080370

Weitere Artikel der Ausgabe 8/2018

Automatic Control and Computer Sciences 8/2018 Zur Ausgabe

Neuer Inhalt