期刊文献+

P2P网络的节点安全认证 被引量:6

Framework for secure authentication of nodes in peer-to-peer network
下载PDF
导出
摘要 为了满足P2P网络中节点安全认证的需求,确保消息路由的可靠性,提出一种"身份认证码统一发放、分布式认证"(CIADA)的节点安全认证方案.该方案改进了"可信第三方"(TTP)信任模型,利用安全动态累积函数有效地实现了节点间的交互认证、节点的动态加入与删除,并且支持域间认证以及域的合并.CIADA认证方案充分考虑了P2P网络的自组织性、动态性及可扩展性,其与PKI技术具有相同的安全强度,并且克服了现有分布式认证方案中证书获取、证书撤销、跨域认证等困难,因此更适用于P2P网络的节点安全认证. A novel authentication framework, which is named central identity-code assignment and distributed authentication(CIADA), is proposed in order to meet the demands of the secure authentication for nodes in the peer-to-peer (P2P) network. The "trusted third party" (TTP) trust model is improved, and the secure dynamic accumulator is utilized to carry out the authentication protocol. The authentication among nodes is implemented efficiently. The dynamic entering or leaving of nodes is supported, and the authentication among domains and the combination of domains are allowed. CIADA takes full account of the characters of P2P network such as self-organization, dynamic and scalability. It is in the same secure intension as public key infrastructure (PKI) but without the defects in keys' issue and revoking and the authentication among domains of other existed distributed authentication protocols. So CIADA is more suitable for the secure authentication of nodes in the P2P network.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第A01期100-104,共5页 Journal of Southeast University:Natural Science Edition
基金 国家高技术研究发展计划(863计划)资助项目(2006AA01Z444)
关键词 P2P 节点认证 安全动态累积函数 peer-to-peer (P2P) authentication of nodes secure dynamic accumulator
  • 相关文献

参考文献14

  • 1Linn J,Branchaud M.An examination of asserted PKI issues and proposed alternatives[C]//Proceedings of the 3rd Annual PKI R & D Workshop.Gaithersburg,2004.
  • 2Zhou L,Haas Z J.Securing ad hoc networks[J].IEEE Network,1999,13(6):24-30.
  • 3Hahm Seongil,Jung Yongjae,Yi Seunghee,et al.A self-organized authentication architecture in mobile ad-hoc networks[C]//International Conference on Information Networking.Jeju Island,South Korea,2005,3391:689-696.
  • 4Luo H Y,Lu S W.Ubiquitous and robust authentication services for ad hoc wireless networks,UCLA-CSDTR-200030[R].Los Angeles:University of California,2000.
  • 5Narasimha M,Tsudik G,Yi J H.On the utility of distributed cryptography in P2P and mantes:the case of membership control[C]//The 11th IEEE International Conference on Network Protocols.Atlanta,Georgia,USA,2003:336-345.
  • 6王贵林,卿斯汉.几个门限群签名方案的弱点[J].软件学报,2000,11(10):1326-1332. 被引量:61
  • 7Gokhale S,Dasgupta P.Distributed authentication for peer-to-peer networks[C]//Applications and the Internet Workshops.Orlando,FL,USA,2003:347-353.
  • 8Camenisch J,Lysyanskaya A.Dynamic accumulators and application to efficient revocation of anonymous credentials[C]//Advance in Cryptology-CRYPTO 2002.Santa Barbara,California,USA,2002,2442:61-76.
  • 9Benaloh J,de Mare Michael.One way accumulators:a decentralized alternative to digital signatures[C]//Advances in Cryptology-Proceedings of Eurocrypt93.Springer-Verlag,1993:274-285.
  • 10Baric N,Pfitzmann B.Collision-free accumulators and failstop signature schemes without trees[C]//Advances in Cryptology,LNCS 1233.Springer Verlag,1997:480-494.

二级参考文献6

  • 1Tseng Y M,Inform Process Lett,1999年,71卷,1期,1页
  • 2Wang C T,Computer Communications,1998年,21卷,8期,771页
  • 3Lu Langru,Advances in Cryptology-China CRYPT'96,1996年,177页
  • 4Li C,Advances in Cryptology-Eurocrypt'94 Proceedings,1995年,194页
  • 5Li C,Advances in Cryptology-Crypto'93 Proceedings,1993年,413页
  • 6徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63

共引文献60

同被引文献31

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部