Key management scheme with bionic optimization

  • Authors:
  • Xuanwu Zhou

  • Affiliations:
  • Key Laboratory of Network & Inf. Security of the Chinese Armed Police Force, Eng. College of the Chinese Armed Police Force, Xi'an, P. R. China and Command College of the Chinese Armed Police ...

  • Venue:
  • IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Mimicking biological evolution, bionic evolution generates optimized individuals with duplication, intercrossing and mutation mechanisms with an adaptive process. In the paper, we analyzed the security problems of traditional key management schemes and presented a key management scheme with parameter optimization based on ECC (Elliptic Curves Cryptosystem). In the scheme, the essential parameters for key generating and distribution are generated with bionic optimization algorithm. The optimization designing strategy avoids the indefiniteness in key management scheme designing and analyzing; besides, dishonest users and other adversaries can not attack the private keys or other secret parameters with an effective polynomial algorithm either. As a comparison with traditional scheme, we present a key management scheme without bionic optimization algorithm. Since the bionic optimization algorithm can be executed in advance. The optimized key management has much superiority in security, yet the efficiency in hardware and software application has not been influenced by the optimization algorithm.