Multi-matrix combined public key based on big data system key management scheme

Author(s):  
Song Ningning ◽  
Sun Yan ◽  
Shi Zhiguo ◽  
Zhou Xianwei
2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Tianqi Zhou ◽  
Jian Shen ◽  
Yongjun Ren ◽  
Sai Ji

Intelligent transportation systems (ITS) have always been an important application of Internet of Things (IoT). Today, big data and cloud computing have further promoted the construction and development of ITS. At the same time, the development of blockchain has also brought new features and convenience to ITS. However, due to the endless emergence of increasingly advanced types of attacks, the security of blockchain-based ITS needs more attention from industry and academia. In this paper, we focus on exploring the primitives in cryptography to guarantee the security of blockchain-based ITS. In particular, the authentication, encryption, and key management schemes in cryptography are discussed. Furthermore, we propose two methods for achieving the threshold key management in blockchain-based ITS. The proposed threshold key management scheme (with threshold t ) enables various stakeholders to recover a secret if the number of participated stakeholders is at least t . It should be noted that the proposed threshold key management scheme is efficient and secure for multiple users in blockchain-based ITS, especially for the data-sharing scenario.


2010 ◽  
Vol 40-41 ◽  
pp. 543-548
Author(s):  
Hong Xin Li ◽  
Jin Hai Su ◽  
Chuan Fu Zhang ◽  
Chun Yu Shao

A robust and efficient key management scheme is necessary for mobile ad hoc networks (MANETs) to ensure its security. CPK (Combined Public Key) is a recently developed public key algorithm, which has advantages comparing with other public key system, such as low storage overhead and calculation demand. Some key management approaches based on CPK have been proposed for MANETs in recent years. However, CPK is vulnerable to collusion attack which may bring about terrible threats. In this paper, a novel key management scheme based on double matrix CPK (DMCPK) is put forward, which is resistant to collusion attack. This key management scheme is described in details, including key generation and updating. Simulation experiments are implemented based on the simulation tool OPNET and show the effectiveness of the proposed scheme.


2017 ◽  
Vol 11 (5) ◽  
pp. 992-999 ◽  
Author(s):  
Kai Fan ◽  
Shuyang Lou ◽  
Ruidan Su ◽  
Hui Li ◽  
Yintang Yang

Sign in / Sign up

Export Citation Format

Share Document