期刊文献+

基于组合对称密钥的大规模身份认证体系研究

Research on large-scale identity authentication architecture based on combined symmetric key
下载PDF
导出
摘要 提出一种基于组合对称密钥的大规模认证体系架构与密钥管理协议,实现芯片级的安全认证过程,对大规模密钥的管理简化为对小规模密钥种子的管理。提出的基于"主—从"认证中心模式的认证体系架构能够高效率地支持大规模用户的并发认证。对该认证系统的安全性进行了分析,并给出了性能测试数据。该系统的实施与应用,能够以较低的建设成本实现对大规模用户身份的识别以及管理能力,对我国网络实名制的研制提供了一个可行的解决方案。 A large-scale real-name authentication architecture and key management protocol based on combined symmet-ric key algorithm were proposed.With the CSK algorithm and smart card technology, the authentication process can be finished in the chips, and the management of large-scale keys can be simplified to the management of small-scale key seeds.The security of the proposed architecture is analyzed and the experimental results are shown.It is obvious that the abilities of large-scale identity authentication and management are improved while the building cost is reduced evidently with the application of the proposed architecture.It is an applicable solution for real-name authentication network.
作者 刘彤 徐冠宁
出处 《通信学报》 EI CSCD 北大核心 2009年第S2期91-95,共5页 Journal on Communications
基金 北京市科技新星计划基金资助项目(2007B028)~~
关键词 组合对称密钥 密钥管理 双向身份认证 网络实名制 combined symmetric key key management bi-directional authentication real-name authentication
  • 相关文献

参考文献7

二级参考文献27

  • 1刘华,王琨.基于PKI的SIP协议安全的研究[J].电子科技,2005,18(2):37-40. 被引量:13
  • 2卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 3南相浩 唐文 余嘉宁.ECC组合公钥[A]..中国计算机学会信息保密专业委员会论文集:第11卷[C].,2001-09..
  • 4D.Bryan,P.Matthews and E.Shim,et.Concepts and Terminology for Peer to Peer SIP,IETF:draft-ietf-p2psip,July 2008.http://tools.ietf.org/id/draft-ietf-p2psip-concepts-02.txt
  • 5D.Bryan,BB.Lowekamp and Cullen Jennings,SOSIMPLE:A Serverless,Standards-based,P2P SIP Communication System [C], AAA-IDEA 2005. IEEE Press, 2005, pp:42 - 49
  • 6Ingmar Baumgart, P2PNS: A Secure Distributed Name Service for P2PSIP [ C ], 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications, 2008. IEEE Press, 2008, pp:480 -485
  • 7M.Matuszewski,P.Laitinen,Security requirements in P2PSIP,IETF:draft-matuszewski-p2psip,November,2007.http://tools.ietf.org/id/draft-matuszewski-p2psip-security-requirements-02.txt
  • 8John R. Douceur, The Sybil Attack [ C ], Peer- to -peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7 - 8, 2002. Springer,2002, pp: 251 - 260.
  • 9Kundan Singh,Henning Schulzrinne.Peer-to-Peer Internet Telephony using SIP.Columbia University Technical Report CUCS-044-04,October,2004,http://www1.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-044-04.pdf
  • 10Seedorf. J. Using Cryptographically Generated SIP - URIs to protect the Integrity of Content in P2P - SIP[ EB/OL]. Third Annual VolP Security Workshop, Berlin, Germany, June 2006, http://www, informatik, uni- hamburg, de/SVS/papers/Using cryptographically generated SIP - URIs. pdf

共引文献170

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部