期刊文献+

基于入侵容忍的CA私钥保护方案

下载PDF
导出
摘要 入侵容忍是网络安全领域的一种新策略,其思想是遭受攻击时,系统仍然保证连续地提供服务,CA是PKI中的关键设施,CA的私钥一旦泄漏,由其签发的所有证书就只能全部作废,因此保护在线CA私钥的安全是尤为重要的,本文对具备了入侵容忍的CA私钥保护方案作了系统介绍。
作者 吴德书
出处 《今日科苑》 2007年第2期66-66,共1页 Modern Science
  • 相关文献

参考文献1

二级参考文献11

  • 1[1]Wu T, Malkin M, Boneh D. Building intrusion tolerant applications.Proceedings of the USENIX Security Symposium, 1999:79-91
  • 2[2]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM,1978;21(2):120-126
  • 3[5]Shamir A. How to share a secret. Communications of the ACM,1979; 22(11):612-613
  • 4[6]Chor B, GoldWasser S, Micali S, Awerbuch B. Verifiable secret sharing and achieving simultaneity in the presence of faults.Proceedings of 26th IEEE Symposium on Foundations of Computer Science. 1985:251-260
  • 5[7]Pedersen T. Non-interactive and information-theoretic secure verifiable secret sharing. Advances in Cryptology-Crypto' 91. 1991:129-140
  • 6[8]Gennaro R. Theory and practice of verifiable secret sharing. USA:Massachusetts Institute of Technology(MIT), 1996
  • 7[9]Feldman P. A practical scheme for non-interactive verifiable secret sharing. Proceedings of 28th IEEE Symposium on Foundations of Computer Science. 1987:427-437
  • 8[10]Gennaro R, Rabin M, Babin T. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. Proceedings of 1998 ACM Symposium on Principles of Distributed Computing. Mexico: Puerto Vallarta, 1998:101-111
  • 9[11]Frankel. Y, Gemmell P, MacKenzie. P D, et al. Optimal-resilience proactive public-key cryptosystems. IEEE Symposium on Foundations of Computer Science, 1997: 384-393
  • 10荆继武,冯登国.一种入侵容忍的CA方案[J].软件学报,2002,13(8):1417-1422. 被引量:65

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部