期刊文献+

一种可证明安全的通用多信任域认证协议 被引量:4

A Universal Provable Security Authentication Protocol for Multi-Domain
原文传递
导出
摘要 首先抽象出一个多信任域模型,然后利用公钥加密和消息认证码技术,提出了一种通用的多信任域认证协议,并对该协议的安全性进行了详细分析。 The problems of existing authentication frameworks are analyzed, and a universal authentication protocol is proposed for the multi-domain. Moreover, entity authentication for cross-domain is supported in the protocol. Especially, by using the modular approach under the Canetti-Krawczyk model, the security of entity authentication is analyzed. It is shown that the proposed protocol is secure and could achieve the security requirements, and the protocol is a secure and fast authentication with high expansibility. This protocol can be applied to the authentication between the networks which use the difference authentication frameworks.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2008年第10期1051-1054,共4页 Geomatics and Information Science of Wuhan University
基金 国家自然科学基金资助项目(60772136) 国家863计划资助项目(2007AA01Z435) 国家教育部高等学校学科创新引智计划资助项目(B08038)
关键词 认证协议 多信任域 Canetti—Krawczyk模型 安全分析 authentication protocol multi-domain canetti-krawczyk model security analysis
  • 相关文献

参考文献8

  • 1Linn J, Branehaud M. An Examination of Asserted PKI Issues and Proposed Alternatives[C]. The 3rd Annual PKI R & D Workshop, Gaithersburg,200zL
  • 2陈炜,龙翔,高小鹏.一种用于移动IPv6的混合认证方法[J].软件学报,2005,16(9):1617-1624. 被引量:12
  • 3Zhu J, Ma J. A New Authentication Scheme with Anonymity for Wireless Environments [C]. IEEE Transactions on Consumer Electronics, Vancouver, Canada, 2004
  • 4彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 5Kaufman C. Internet Key Exchange (IKEv2) Protocol[EB/OL]. http://www. ietf. org/internetdrafts/ Draft-ietf-IPSec-ikev2-11. txt, 2003
  • 6Bellare M, Canetti R, Krawczyk H. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols[C]. The 30th Annual Symposium on the Theory of Computing, New York, 1998
  • 7Canetti R, Krawczyk H. Analysis of Key-exchange Protocols and Their Use for Building Secure Channel[C]. The Euro-crypt 01, Denmark, 2001
  • 8冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学(E辑),2007,37(2):223-237. 被引量:14

二级参考文献28

  • 1彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:100
  • 3Johnson D, Perkins C, Arkko J. Mobility support in IPv6. draft-ietf-mobileip-ipv6-24.txt, 2003.
  • 4Arkko J, Devarapalli V, Dupont F. Using IPSec to protect mobile IPv6 signaling between mobile nodes and home Agents.drafl-ieff-mobileip-mipv6-ha-IPSec-06.txt, 2003.
  • 5Nikander P, Aura T, Arkko J, Montenegro G. Mobile IP version 6 route optimization security design background, drafl-nikander-mobileip-v6-ro-sec-00, 2003.
  • 6Stallings W. Cryptography and Network Security: Principles And Practice. 3rd ed., Upper Saddle River: Prentice Hall, 2003.
  • 7Kent S, Atkinson R. Security architecture for the Internet protocol. RFC2401, 1998.
  • 8Kent S, Atkinson R. IP encapsulating security payload (ESP). RFC2406, 1998.
  • 9Kent S, Atkinson R. IP authentication header. RFC2402, 1998.
  • 10Cheng PC. An architecture for the Internet key exchange protocol. IBM Systems Journal, 2001,40(3):721-746.

共引文献78

同被引文献35

  • 1闵连权.基于LSB的遥感图像安全传输模型[J].测绘工程,2005,14(1):11-14. 被引量:4
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3周权,吴思远,肖德琴,冯健昭.基于椭圆曲线的图像频域信息隐藏方案[J].重庆邮电学院学报(自然科学版),2006,18(6):762-765. 被引量:1
  • 4王振朝,王芳,郑伟.基于混沌序列的遥感图像的加密和解密[J].河北遥感,2007(1):11-12. 被引量:2
  • 5Wang Xianmin, Guan Zequn, Wu Chenhan. An Adaptive Wavelet 2 dimension Watermarking Algo rithm for Remote Sensing Images [J]. Electronic Imaging and Multimedia Technology, 2005, 4 : 649- 656.
  • 6Koblitz N. Elliptic Curve Cryptosystems[J].Mathematics of Compution American Mathematical Society,1987(48) ,203-309.
  • 7Miller V S. Use of Elliptic Curves in Cryptography [C]. Lecture Notes in Computer Science, California, 1986.
  • 8Montgomery P L. Speeding the Pollard and Elliptic Curve Methods of Factorizations[J]. Math Comp, 1987,48:243-264.
  • 9Chi Kuang-hui, Shih Yung-chien, Liu Ho-han, et al. Fast handoff in secure IEEE 802.11s mesh networks. IEEE Transactions on Vehicular Technology, 2011, 60(1): 219-232.
  • 10Li Nan. Research on Diffie-Hellman key exchange protocol. Proceedings of the 2nd International Conference on Computer Engineering and Technology, Chengdu, China, 2010:634-637.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部