期刊文献+

基于多级单向哈希链的网格代理证书管理 被引量:1

Grid Proxy Certificates Management Scheme Based on Hierarchical One-way Hash Chains
下载PDF
导出
摘要 代理证书是网格安全基础设施(GSI)中关键机制之一,用户需要通过代理证书访问网格服务,但目前的GSI方案中缺乏有效的代理证书管理机制。针对代理证书的生命周期控制不灵活、证书容易受到攻击等问题,该文提出一种基于多级单向哈希链的网格代理证书管理方案。多级单向哈希链由2层或2层以上哈希链构成,每个代理证书都由一个哈希值保护,其有效时间能够得到自适应控制,增强了网格代理证书管理的安全性和任务成功率。实验表明网格环境下该方案计算和通信开销较小。 Proxy Certificates(PCs) is one of key mechanisms in Grid Security Infrastructure(GSI). Users need PCs to access grid services. But there is no effective mechanism to manage the PCs in GSI. An adaptive proxy certificates management scheme based on hierarchical one-way hash chains in grids is presented to solve the problem that PCs' lifetime does not be controlled nearly and PCs would be attacked easily. A hierarchical one-way chain consists of two or more levels of chains, where values of a first-level chain act as roots of a set of second-level chains and each PC is protected by a hash value, so the PCs' available time can be controlled adaptively. Results show that the security of PCs management and success rate of tasks are improved. Experiments indicate computation and communication costs much lower in grid environments.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第5期107-109,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60573040) 陕西省自然科学基金资助项目(2004F14)
关键词 网格安全基础设施 代理证书 多级单向哈希链 哈希值 Grid Security Infrastructure(GSI) Proxy Certificates(PCs) hierarchical one-way hash chains hash value
  • 相关文献

参考文献5

  • 1Foster I, Kesselman C. The Grid: Blueprint for a New Computing Infrastructure[M]. San Francisco: Morgan Kaufmann Publishers, t 999.
  • 2Housley R, Polk W, Ford W. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile[S]. IETF, RFC 3280, 2002.
  • 3IETF Public-key Infrastructure (X.509) (PKIX)[EB/OL]. (2004-01-12). http://www.ietf.org/html.charters/kix-charter.html.
  • 4Berson T A, Gong L, Lomas T M A. Secure: Keyed, and Collisionful Hash Functions[R]. SRI International, Tech Rep: SRI-CSL-94-08, 1994.
  • 5Foster I, Kesselman C. Globus: A Metacomputing Infrastructure Toolkit[J]. International Journal of Supercomputer Applications, 1997, 11(2): 115-128.

同被引文献8

  • 1冯楠,铁岭,李建华.基于哈希链表的HAWAII微移动协议认证方案[J].信息安全与通信保密,2006,28(1):42-45. 被引量:3
  • 2Quan SN. Multi-dimensional Hash chains and application to micropayment schemes [C]. Bergen, Norway: Proe of Interna- tional Workshop on Coding and Cryptography, 2005:96-106.
  • 3Zhao Meiyuan,Sean W Smith. Modeling and evaluation of certification path discovery in the emerging global PKI[M]. Springer-Verlag Berlin Heidelbeg,2006:16-30.
  • 4Cristina Satizabal. Reducing the computational cost of certification path validation in mobile payment[M]. Springer-Verlag Berlin Heidelbeg,2007:280-296.
  • 5Gao J,Shim S.P2P-Paid: A peer-to-peer wireless payment system[C].Second IEEE International Workshop on Mobile Commerce and Services, 2005:102-111.
  • 6William Stallings.密码编码学与网络安全:原来与实践[M].杨明,译.北京:电子工业出版社.2006:305-310.
  • 7韩奉锦.一种移动身份认证中哈希链认证协议的改进设计[J].科技创新导报,2008,5(13):29-29. 被引量:1
  • 8蔡满春,赵海洋,郭代飞.移动环境下的一种基于双向认证的哈希链签名方案[J].计算机应用研究,2008,25(5):1532-1533. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部