期刊文献+

一种基于缓存的快速PKI认证模型 被引量:1

A Flexible and Fast PKI Authentication Model Based on Cache Mechanism
下载PDF
导出
摘要 在大规模PKI系统中跨域建立证书信任时,为提供高效的证书路径发现及认证算法,基于缓存机制提出了一种系统、灵活的认证框架.该框架模型对于短期缓存认证提出一次一密以提高安全性;对于较长时期的证书缓存提出证书可靠性指数概念,让用户可在安全和效率间权衡.扩展证书缓存及证书可靠性指数到CA间的认证,满足实际网络环境需要,提高了认证效率,消除了上层CA证书验证服务时存在的性能瓶颈问题. To establish trust on certificates across multiple domains requires an efficient certification path discovery and authentication algorithm. A systematic and flexible authentication model based on cache mechanism is proposed. The model uses one-time key to achieve more secure level for a shorter time cache. For a longer time cache, the concept of reliability index (RI) is introduced for the certification, with which the end user can take a trade off between security and efficiency. To meet the practical network environment, the authentication mechanism between the end user and CAs is extended. The authentication time between CAs are reduced, and more importantly, most authentication processes are finished between lower level CAs, so there is no bottleneck problem to occur in the top level CAs, especially the root CA.
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2008年第1期58-61,74,共5页 Transactions of Beijing Institute of Technology
关键词 缓存 PKI 认证模型 cache PKI authentication model
  • 相关文献

参考文献8

  • 1Loren M K. Toward a practical public-key cryptosystem [ D ]. Massachusetts: Dep. of Electrical Engineering, MIT, 1978.
  • 2Housley R, Polk W, Ford W, et al. Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile[ EB/OL]. [ 2002-04 ]. http ://www. ietf. org/rfc/rfc3280, txt.
  • 3Zhao M Y, Smith S W. Modeling and evaluation of certification path discovery in the emerging global PKI [C]// Proceedings of EuroPKI 2006. Torino, Italy: [s. n. ], 2006 : 16 - 30.
  • 4Elley Y, Anderson A, Hanna S, et al. Building certification paths: forward vs. reverse [C] ff Proceedings of the 10th Annual Network and Distributed Systems Security Symposium (NDSS'01) 2001. San Diego, USA: [s. n. ], 2001.
  • 5Kocher P C. On certificate revocation and validation[C]// Proceedings of the Second International Conference on Financial Cryptography ( FC ' 98 ). London, England: [s.n. ], 1998.
  • 6CoreStreet Ltd. Distributed OCSP-security, scalability, and availability for certificate validation [ R ]. Massachusetts, USA: Corestreet, 2002.
  • 7Boneh D, Ding X H, Tsudik G. Fine-grained control of security capabilities [J ]. ACM Transactions on Internet Technology (TOIT), 2004, 4(1):60 - 82.
  • 8Boneh D, Ding X H, Tsudik G, et al. A method for fast revocation of public key certificates and security capabilities [C]//Proceeding of 10th Usenix Security Symposium. Washington, USA: [s. n. ], 2005:297 - 308.

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部