Abstract:Point to the security of four sub modules in spectrum management, with the cryptographic protocols that include zero-knowledge proof, group key management, bit commitment proof and security multi computation design a novel scheme to protect the network security, which has the four substantial problems of primary identity, secure channels, information share and shared channels. This scheme not only protects the security of spectrum management, but also improves the efficiency of security management, which is more complete and flexible than the physics scheme.