期刊文献+

基于DSA的一次性有限授权密码机制

One-time Limited Authorization Password Mechanism Based on DSA
下载PDF
导出
摘要 提出一种基于数字签名算法(DSA)的一次性有限授权密码机制。在该机制下,密码拥有者可以在不泄露密码、不访问系统的情况下赋予其他用户临时访问系统的权利,并对访问过程的时间长度和次数具有高度自由的分配和监控能力。该机制在求解离散对数困难性的基础上生成安全性较高的有限授权密码,能有效地防止授权密码被伪造和重复使用,具有较强的实用价值。 This paper introduces a one-time limited authorization password mechanism based on DSA, which allows password-owner to grant his right to a temporary user without releasing original password and limit the access time and frequency with a high degree of freedom and oversee the access behavior. Based on the difficulty of computing discrete logarithms, the mechanism which has highly practical valuable, can generate limited authorization password safely without being forged or re-used effectively.
作者 平源 李慧娜
出处 《计算机工程》 CAS CSCD 北大核心 2010年第5期149-150,共2页 Computer Engineering
基金 河南省教育厅科技攻关计划基金资助项目(0624220058)
关键词 数字签名算法 有限授权密码 访问控制 防伪造 Digital Signature Algorithm(DSA) limited authorization password access control nonforgeability
  • 相关文献

参考文献4

  • 1詹涛,周兴社,廖志刚.有限授权密码机制[J].计算机工程,2008,34(2):28-30. 被引量:1
  • 2National Institute of Standards and Technology. FIPS PUB 186-2-2000 Digital Signature Standard(DSS)[S]. 2000.
  • 3Stallings W. Cryptography and Network Security Principles and Practices[M]. 4th ed. [S. l.]: Prentice Hall, 2005.
  • 4Cormen T H, Leiserson C E, Rivest R L, et al. Introduction to Algorithms[M]. 2nd ed. [S. l.]: MIT Press and McGraw-Hill, 2001.

二级参考文献5

  • 1Bellare M, Canetti R, Krawczyk H. Keyed Hash Functions and Message Authentication[C]//Proceedings of Crypto'96. Los Angeles, California, USA: [s. n.], 1996.
  • 2Belgers W. Unix Password Security[Z]. (1993-12-11). http://packet storm.security.com/papers/unix/password.ps.
  • 3Edwards M J, LeBlanc D. Where NT Stores Passwords[Z]. (2006-09-10). http://www.microsoft.com/technet/prodtechnol/winnt as/tips/winntmagstorpass.mspx.
  • 4Oorschot E Wiener M. Parallel Collision Search with Application to Hash Functions and Discrete Logarithms[C]//Proceedings of the 2nd ACM Conference on Computer and Communications Security. [S. l.]: ACM Perss, 1994.
  • 5Menezes A, Oorschcot E Handbook of Applied Cryptography[M]. Boca Raton FL: CRC Press, 1997.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部