Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
Designs, Codes and Cryptography
A Group Signature Scheme Committing the Group
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
1-out-of-n Signatures from a Variety of Keys
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
Proceedings of the 8th annual conference on Genetic and evolutionary computation
Dynamic Group Signature with Forward Security and Its Application
GCC '07 Proceedings of the Sixth International Conference on Grid and Cooperative Computing
Evolutionary Algorithm and Its Application in Artificial Immune System
IITA '08 Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 03
Threshold Cryptosystem and Its Application in Key Management Scheme
KAM '08 Proceedings of the 2008 International Symposium on Knowledge Acquisition and Modeling
Bionic evolution based intrusion detection system
CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
General secure multi-party computation from any linear secret-sharing scheme
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A new (t, n)-threshold multi-secret sharing scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance
IEEE Transactions on Signal Processing
Efficient statistical parallel interference cancellation for DS-CDMA in Rayleigh fading channels
IEEE Transactions on Wireless Communications
Learning and optimization using the clonal selection principle
IEEE Transactions on Evolutionary Computation
Genetically modified multiuser detection for code division multiple access systems
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Mimicking biological evolution, bionic evolution generates optimized individuals with duplication, intercrossing and mutation mechanisms with an adaptive process. In the paper, we analyzed the security problems of traditional key management schemes and presented a key management scheme with parameter optimization based on ECC (Elliptic Curves Cryptosystem). In the scheme, the essential parameters for key generating and distribution are generated with bionic optimization algorithm. The optimization designing strategy avoids the indefiniteness in key management scheme designing and analyzing; besides, dishonest users and other adversaries can not attack the private keys or other secret parameters with an effective polynomial algorithm either. As a comparison with traditional scheme, we present a key management scheme without bionic optimization algorithm. Since the bionic optimization algorithm can be executed in advance. The optimized key management has much superiority in security, yet the efficiency in hardware and software application has not been influenced by the optimization algorithm.