期刊文献+

IPv6下基于逐跳认证的确定包标记算法

Deterministic Packet Marking Algorithm Based on Hop-by-Hop Authenticated in IPv6
下载PDF
导出
摘要 对确定包标记算法中,标记信息在网络中传输缺乏验证,容易被受控路由器篡改而产生虚假标记,导致获取错误入口地址的问题进行了研究,引入基于身份的签名方案,结合IPv6协议特点,提出了逐跳认证的概念和新的认证确定包标记算法。 In deterministic packet marking algorithm, when marking information transmitted in the network lack of verification, and be easily tampered with a false marker by controlled routers, leading to the wrong ingress address access issues, the paper introduced an identity-based signature scheme, combine the characteristic of IPv6 protocol, propose the Hop-by-Hop authentication concept and a new certification deterministic packet marking algorithm.
出处 《微计算机信息》 2009年第12期131-133,共3页 Control & Automation
关键词 拒绝服务攻击 IP追踪 IPV6 基于身份认证 确定包标记 denial of service attack IP traceback IPv6 identity-based authentication deterministic packet marking
  • 相关文献

参考文献6

  • 1Belenky Andrey,Ansari Nirwan.On IP Traceback[J].IEEE Communications Magazine,2003,41 (7): 142-153.
  • 2Belenky Andrey,Ansari Nirwan.On deterministic packet marking [J].Computer Networks 2007,51(10):2677-2700.
  • 3Shamir A.Identity-based cryptosystems and signature schemes [J].Advances in Cryptology,LNCS,1984,196:47-53.
  • 4RFC2460:Intemet Protocol, Version 6 (IPv6) Specification[S]
  • 5Hess F.Efficient identity based signature schemes based on pairings.SAC 2002,LNCS 2595,Springer-Verlag,Berlin,2003:310 - 324.
  • 6娄建军,王尚平.可认证安全的多接收者签密方案[J].微计算机信息,2008,24(6):76-77. 被引量:3

二级参考文献11

  • 1陈瑞虎,高峰修,马传贵.GOST门限签密方案[J].微计算机信息,2005,21(11X):9-10. 被引量:5
  • 2[1]ZHENG Y.Digital Signcryption or How to Achieve Cost (signature & encryption) 《《Cost (signature) +Cost (encryption)[A].CYPTOp97,Lecture Notes in Computer Science 1294[C].Berlin:Springer-Verlag,1997.165-179.
  • 3[2]Shamir A.Identity based cryptosystems and signature schemes[C].Advances in Cryptology-Crypto'84,LNCS 196.Berlin:Springer-Verlag,1984.47-53.
  • 4[3]Baek Joonsang,Zheng Yuliang.Identity-based threshold decryption[C].PKC'04,LNCS 2947.Berlin:Springer-Verlag,2004.262-276.
  • 5[4]Boneh D,Franklin M.Identity-based encryption from the weil pairing[C].Crypto'01,LNCS 2139.Berlin:Springer-Verlag,2001.213-229.
  • 6[5]Horster P,Michels M,Petersen H.Authenticated Encryption Scheme with Low Communication Costs[J].Electronic Letters,1994,30(15):1212-1213.
  • 7[6]A.Shamir.Identity based cryptosystems and signature schemes[C].In Advances in Cryptology-Crypto'84,volume 0196 of LectureNotes in Computer Science,Springer-Verlag,1984.47-53.
  • 8[7]Zheng Y.Signcryption and its applications in efficient public key solutions[C].Proceedings of Information Security Workshop,1998:291-312
  • 9[8]Malone-Lee.J Identity-based signcryption[EB/OL].http://eprint.iacr.org/2002/098.
  • 10[9]Seo M,Kim K.Electronic funds transfer protocol using domainverifiable signcryption scheme[C].In:Information Security and Cryptology-ICISC'99,LNCS 1787,Springer-Verlag,1999.269-277.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部