Journal of Information Security Research ›› 2017, Vol. 3 ›› Issue (11): 1040-1044.

Previous Articles     Next Articles

Research of Identity-Based Cryptography Application in Internet of Things

  

  • Received:2017-11-19 Online:2017-11-15 Published:2017-11-18

物联网中标识密码应用研究

周传玉1,王吉伟2,李明1   

  1. 1. 山东省信息中心
    2. 山东确信信息产业股份有限公司
  • 通讯作者: 周传玉
  • 作者简介:周传玉,高级工程师,主要研究方向为电子认证、信息安全. 王吉伟,高级工程师,主要研究方向为信息安全、密码学. 李明,工程师,主要研究方向为电子认证、信息安全.

Abstract: With the widespread use of public key cryptography(PKI), there are some defects in the management also exposed, such as certificate of search, cancellation, storage, issuance and verify that all need to take up a lot of valuable network resources, and can lead to a larger storage overhead and computation overhead. Identity-based cryptography( IBC) is developed based on PKI, besides has the PKI technology advantages, mainly solved in the specific application of PKI security needs a large number of exchange of digital certificates, make security applications more easy to deploy and use. The IBC password technology USES asymmetric cryptography to encrypt and decrypt two sets of keys. Compared with the public key cryptosystem based on digital certificate, identity-based cryptosystem has don't need certificate center, has a higher safety performance, shorter key lengths and convenient key management, can be combined with Internet of things(iot) device identifier, solve identification in iot, key security issues such as link encryption, data protection.

Key words: Internet of things, identity-based cryptography, data encryption, data signature, PKI

摘要: 随着公钥密码体系(PKI)的广泛应用,PKI在管理上存在着一些缺陷也暴露出来了,如证书的查找、撤销、存储、颁发和验证这都需要占用大量宝贵的网络资源,并且会带来较大的存储开销和计算量开销.基于标识的密码体制(IBC)是在传统的PKI基础设施基础上发展而来,除了保有PKI的技术优点外,主要解决了在具体安全应用中PKI需要大量交换数字证书的问题,使安全应用更加易于部署和使用.IBC密码技术使用的是非对称密码体系,加密与解密使用2套不同的密钥.与基于数字证书的公钥密码体制相比,基于标识的密码体制具有不需要证书中心,更高的安全性能、较短的密钥长度和方便的密钥管理,可以和物联网设备标识相结合,解决物联网中身份鉴别、链路加密、数据防护等关键安全问题.

关键词: 物联网, 标识密码, 数据加密, 数据签名, 公钥密码基础设施