期刊文献+

组合公钥密码的网格身份认证机制 被引量:2

Combined public key based certification mechanisms of grid
下载PDF
导出
摘要 针对目前以PKI技术为基础的网格安全基础设施认证机制存在的用户规模小、效率低、依赖第三方机构在线运行等问题,提出了基于组合公钥密码的网格身份认证机制.该机制根据离散对数难题的数学原理构建公开密钥与私有密钥矩阵,生成数量庞大的由公开密钥与私有密钥组成的公私钥对,从而实现基于标识的超大规模的密钥生产与分发.通过在网格应用中实现该机制,和网格安全基础设施的认证效率进行了比较,验证了基于组合公钥密码的网格身份认证机制的可行性和高效性. Grid security is complicated on account of pervasive resource sharing and dynamic, heterogeneous, multi-domains computing environment. Since the public key infrastructure (PKI)-based grid security infrastructure (GSI) is figured to be not efficient enough for large scaled grid applications, and need third-party authorities keeping online, a combined public key (CPK) based certification mechanism of grid is proposed. Basing on the mathematics principle of discrete log problem, huge quantities of key pairs can be produced by a public and private key matrix, and producing and distributing of huge amount of keys can be realized. Implementing in grid applications, the efficiency of CPK is compared with that of GSI, and the CPK based certification mechanism of grid is proved to be feasible and efficient.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第11期40-43,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60403027 60273076)
关键词 网格计算 身份认证 数据安全 安全通信 组合公钥 grid computing certification security of data telecommunication security combined public key
  • 相关文献

参考文献8

  • 1Foster I, Kesselman C. The grid: blueprint for a new computing infrastructure [M]. San Fransiseo: Morgan Kaufmann, 1999.
  • 2Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids[C]// ACM Conference on Computers and Security, 1998. San Fran- cisco: ACM Press, 1998: 83-92.
  • 3Gutmann P. PKI: it's not dead, just resting[J]. IEEE Computer, 2002, 35(8): 41-49.
  • 4Zhu L, Jaganathan K, Hartman S. The kerberos version 5 generic security service application program interface (GSS-API) mechanism., version 2[S]. RFC 4121, 2005. http://www. ietf. org/rfc/rfc4121. txt.
  • 5Housley R. Internet X. 509 public key infrastructure certificate and CRL profile[S]. RFC 2459, 2000. http ://www. ietf. org/rfc/rfc2459. txt.
  • 6YAN Fei,ZHANG Huanguo,SUN Qi,SHEN Zhidong,ZHANG Liqiang,QIANG Weizhong.An Improved Grid Security Infrastructure by Trusted Computing[J].Wuhan University Journal of Natural Sciences,2006,11(6):1805-1808. 被引量:3
  • 7Ian Foster.Globus Toolkit Version 4: Software for Service-Oriented Systems[J].Journal of Computer Science & Technology,2006,21(4):513-520. 被引量:44
  • 8Cafaro M, Lezzi D, Fiore S, et al. The GSI plug-in for gSOAP., building cross-grid interoperable secure grid services[J]. Lecture Notes in Computer Science, 2008, 4 967: 894-901.

二级参考文献66

  • 1Foster I, Kesselman C, Tuecke S. The anatomy of the Grid: Enabling scalable virtual organizations. International Journal of Supercomputer Applications, 2001, 15(3): 200-222.
  • 2Booth D, Haas H, McCabe F et al. Web Services Architecture. W3C, Working Draft, 2003.http: / /www.w3.org/ TR / 2003 /WD-ws-arch- 20030808 /.
  • 3Kendall S C, Waldo J, Wollrath A, Wyant G. A Note on Distributed Computing. Technical Report TR-94-29, Sun Microsystems, 1994.
  • 4Foster I, Tuecke S. Describing the elephant: The different faces of IT as service. ACM Queue, 2005, 3(6): 26-29.
  • 5The TeraGrid Project. 2006, www.teragrid.org.
  • 6Open Science Grid (OSG). 2006, www.opensciencegrid.org.
  • 7Foster Iet al. The Grid2003 production Grid: Principles and practice. In IEEE Int. Syrup. High Performance Distributed Computing, 2004, IEEE Computer Science Press.
  • 8Cancer Bioinformatics Grid (caBIG). 2006, http://cabig.nci.nih.gov.
  • 9Enabling Grids for eScience (EGEE). 2006, http://public.euegee.org.
  • 10LHC Computing Grid. 2006, http://lcg.web.cern.ch/LCG.

共引文献45

同被引文献15

  • 1李益发,韩臻,赵亚群,沈昌祥.CPK的安全性分析及其与PKI的比较[J].武汉大学学报(理学版),2004,50(A01):197-200. 被引量:2
  • 2沈昌祥.关于加强信息安全保障体系的思考[J].中国计算机用户,2002(45):37-37. 被引量:9
  • 3赵小伟,王绍斌.基于标识算法的密钥管理体系和CPK认证[J].信息安全与通信保密,2007,29(6):200-202. 被引量:7
  • 4IEEE P1363. Standard for public- key cryptography: working draft[EB/OL]. 2000-08-01. http://www. secg. org.
  • 5Sunar B, Koc C K. An efficient optimal normal basis type Ⅱ multiplier[J]. IEEE Transactions on Computers, 2001, 50(1): 83-87.
  • 6Menezes A J. Applications of finite fields[M]. Boston: Kluwer Academic Publishers, 1993.
  • 7Omura J, Massey J. Computational method and apparatus for finite field arithmetic, US Patent, No. 4587627. 1983-06-08.
  • 8Dl R L, Iederreiter H N. Introduction to finite fields and their applications[M]. England: Cambridge University Press, 1994.
  • 9Bbleyd, Paar C. Optimal extension fields for fast arithmetic in public[J]. Key Algorithms Advances in Cryptography, 1998, 270(1 462): 472-485.
  • 10Hasan M A, Wang M Z, Bhargava V K. A modified Massey-Omura parallel multiplier for a class of finite fields[J]. IEEE Transactions on Computers, 1993, 42(10): 1 278-1 280.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部