计算机工程与应用 ›› 2010, Vol. 46 ›› Issue (17): 133-135.DOI: 10.3778/j.issn.1002-8331.2010.17.037

• 网络、通信、安全 • 上一篇    下一篇

用户可匿名和认证的无线电话会议密钥新协议

戴智君,卢建朱   

  1. 暨南大学 计算机科学系,广州 510632
  • 收稿日期:2009-02-09 修回日期:2009-03-30 出版日期:2010-06-11 发布日期:2010-06-11
  • 通讯作者: 戴智君

Wireless conference key protocol with anonymity and authentication

DAI Zhi-jun,LU Jian-zhu   

  1. Department of Computer Science,Jinan University,Guangzhou 510632,China
  • Received:2009-02-09 Revised:2009-03-30 Online:2010-06-11 Published:2010-06-11
  • Contact: DAI Zhi-jun

摘要: 无线电话会议由于具有不受地域限制、经济和方便等优点,使得它成为一个研究热点。在无线电话会议中,对会议参与者的身份进行认证和匿名是非常重要的安全问题。将对称加密系统、单向的安全Hash函数和(t,n)秘密共享方案相结合,提出了一种建立无线电话会议密钥的新协议。协议较好地解决了用户认证性和匿名性问题,用(t,n)秘密共享方案保证了与会者人数不少于t。根据会议的重要性和无线网络的连接性,会议主持人可以设置合适的t值。与Zhong的方案相比,该协议具有更好的实用性和广泛的应用前景。

关键词: 电话会议, (t, n)秘密共享, 匿名, 认证

Abstract: Wireless conference call has become a research hotspot due to its economy,convenience and uncertain location of the participants.The ability to protect and authenticate the identity of participants in wireless conference call application is critical.In this paper,a new protocol presented for wireless conference key setup integrates symmetric key encryption,hashing and (t,n) secret shared together.To start a new conference,at least t participants have to be active and broadcast their shares.This protocol provides mobile participants with user identity anonymity and authentication during the conference call.According to the importance of the meeting and the connection of the wireless network,the chairperson can set an appropriate value for its corresponding t.Compared with Zhong’s protocol,this protocol has better availability and wider application.

Key words: conference call, (t, n) secret shared, anonymity, authentication

中图分类号: