期刊文献+

一种针对弹性CA的分布式密钥产生方案 被引量:1

A Distributed CA-Key Generation Scheme for Resilience CA
下载PDF
导出
摘要 弹性CA是一种使用入侵容忍技术保护CA密钥的CA系统,它采用了新的私钥分割方法加强了系统的安全性,但其使用的密钥分发中心却不利于CA私钥安全.分布式密钥产生方案就是在传统的弹性CA方案的基础上取消了密钥分发中心,使用分布式的密钥产生和分割机制,从而保证了在CA初始化和整个运行过程中,任意t-1(t为门限值)台服务器都不可能窃得CA私钥,大大加强了CA系统安全. Resilience CA is a CA system which implements an intrusion tolerant algorithm to protect the private key of CA. It enhances the security of system by implementing a new method to split the private key, but it uses a key distribution center to generate the CA-key and this center compromises the private key. Based on the traditional resilence CA scheme, this scheme cancels the key distribution center, and implements a distributed algorithm to generate a shared CA key, so that any t - 1 ( t is the threshold number) servers can't compromise the private key of CA in the initialization and running stage of CA.
作者 庄湧 冯登国
出处 《计算机研究与发展》 EI CSCD 北大核心 2007年第2期230-235,共6页 Journal of Computer Research and Development
关键词 弹性 入侵容忍 CA 分布式 数字签名 resilience intrusion tolerant CA distributed digital signature
  • 相关文献

参考文献16

  • 1J E Dobson,B Randell.Building reliable secure computing systems out of unreliable insecure components[C].IEEE Symp on Security and Privacy,Oakland,CA,1986
  • 2Y Deswarte,L Blain,J-C Fabre.Intrusion tolerance in distributed computing systems[C].IEEE Symp on Security and Privacy,Oakland,CA,1991
  • 3P S Gemmell.An introduction to threshold cryptography[J].CryptoBytes,1997,2(3):7-12
  • 4V Shoup.Practical threshold signatures[G].In:Proc of EUROCRYPT'00,LNCS 537.Berlin:Springer-Verlag,2000.207-220
  • 5T Wu,M Malkin,D Boneh.Building intrusion tolerant applications[C].In:Proc of the USENIX Security Symposium.Washington:USENIX Association,1999.79-91
  • 6I Damgard,M Koprowski.Practical threshold RSA signatures without a trusted dealer[C].In:Proc of EUROCRYPT'01,LNCS 2045.Berlin:Springer-Verlag,2001.152-165
  • 7P -A Fouque,J Stern.Fully distributed threshold RSA under standard assumptions[G].In:Proc of ASIACRYPT 2001,LNCS 2248.Berlin:Springer-Verlag,2001.310-330
  • 8T Straub.Efficient two party multi-prime RSA key generation[C].IASTED CNIS,New York,2003
  • 9荆继武,冯登国.一种入侵容忍的CA方案[J].软件学报,2002,13(8):1417-1422. 被引量:65
  • 10D Boneh,M Franklin.Efficient generation of shared RSA keys[G].In:Proc of Advances in Cryptology-CRYPTO'97,LNCS 1294.Berlin:Springer-Verlag,1997.425-439

二级参考文献4

  • 1[1]Gemmell, P.S. An introduction to threshold cryptography. CryptoBytes, 1977,2(7):7~12.
  • 2[2]Wu, T., Malkin, M., Boneh, D. Building intrusion-tolerant applications. In: Proceedings of the USENIX Security Symposium. 1999. 79~91.
  • 3[3]Shoup, V. Practical threshold signatures. In: Proceedings of the Eurocrypt 2000. Bruges (Brugge): Springer-Verlag, 2000. 207~220.
  • 4[4]Frankel, Y., Gemmell, P., MacKenzie, P.D., et al. Optimal-Resilience proactive public-key cryptosystems. In: IEEE Symposium on Foundations of Computer Science. 1997. 384~393.

共引文献64

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部