期刊文献+

IBE-XKMS:一个基于XML的IBE密钥管理服务体系 被引量:6

IBE-XKMS: XML-Based IBE Key Management Service Infrastructure
下载PDF
导出
摘要 本文详细分析了基于身份的公钥加密体制(IBE)较PKI在XKMS方面的应用优势,提出了一个面向IBE的XKMS服务体系——IBE-XKMS,阐述了系统管理、身份认证、密钥生成、密钥管理等模块的功能架构以及系统服务的逻辑关系,设计了4类IBE密钥服务,除实现基本的XKMS密钥操作接口外,还设计了支持零客户端安全应用开发的数字信封和数字签名等服务接口,为下一代网络开发环境提供了一个完整的IBE密钥管理服务解决方案。本文实现了一个IBE-XKMS原型系统,并给出IBE-XKMS和PKI-XKMS在密钥服务响应时间和SOAP消息通信量等方面的测试结果,测试结果体现了IBE-XKMS的性能优势。 In this paper,the differences between PKI and identity-based encryption(IBE) are firstly analyzed,and the advantages of building XKMS infrastructure for IBE are in detail discussed.An XKMS-like service architecture for IBE,named IBE-XKMS,is then proposed,and the modules of system management,identity authentication,key generation and key management are designed,as well as the service component logic relationships are described.Next,the key management service interfaces of four categories are proposed.Besides the basic XKMS services,IBE-XKMS also provides two types of key involved operations to implement the IBE encryption envelope and signature service,which can be utilized to develop some IBE-enabled secure web application without code on client.It is noted that IBE-XKMS provides a service framework with full IBE application supported for the next generation network of web service.At last,a prototype of IBE-XKMS is developed,on which the tests on the service response performance and the SOAP message communication cost are conducted,comparing with that of PKI-enabled XKMS.
出处 《电信科学》 北大核心 2010年第7期22-31,共10页 Telecommunications Science
基金 国家"973"计划基金资助项目(No.2010CB328106) 国家自然科学基金资助项目(No.60773115) 软件开发环境国家重点实验室开放课题(No.SKLSDE-2009KF-2-01)
关键词 PKI IBE XKMS XML Web SERVICE 密钥管理 PKI IBE XKMS XML Web Service key management
  • 相关文献

参考文献24

  • 1Koblitz N, Menezes A. A survey of publick-key cryptosystems, SIAM Review Archive, 2004, 46(4): 599-634.
  • 2http://www.iacr.org/workshops/pkc2009/.
  • 3A survey of public key infrastructures, http://configura.gva.es/ sistemes/seguridad/tesis/contents.html.
  • 4Papazoglou M P, Heuvel W J. Web services management: a survey. IEEE Internet Computing, 2005, 9(6): 58N64.
  • 5XML key management specification (XKMS 2.0). http://www.w3. org/TR/2005/PR-xkms2-20050502/, May 2 2005.
  • 6Crampton J, Lim H W, Paterson K G. What can identity-based cryptography offer to web service? In: Proceedings of the 2007 ACM Workshop on Secure Web Services, New York, ACM, 2007.
  • 7Lin J, Jing J, Liu P. A framework for intrusion tolerant certification authority system evaluation. In: Proceedings of IEEE Symposium on Reliable Distributed Systems, October 2007.
  • 8Shamir A. Identity-based cryptosystems and signature schemes. advances in cryptology. In: Proceedings of CRYPTO 84, Berlin, 1984.
  • 9Boneh D, Franklin M K, Identity-based encryption from the weil pairing advances in cryptology. In: Proceedings of CRYPTO 2001, Berlin, 2001.
  • 10Boyen X. Multipurpose identity-based signcryption a swiss army knifer for identity-based cryptography, http://eprint.iacr.org/2003/ 163.

二级参考文献36

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:100
  • 3林闯,雷蕾.下一代互联网体系结构研究[J].计算机学报,2007,30(5):693-711. 被引量:64
  • 4Hankerson Darrel, Menezes Alfred J, Vanstone Scott. Guide to Elliptic Curve Cryptography. Berlin: Springer-verlag Publishers, 2004.
  • 5Enge Andreas. Elliptic Curves and Their Applications to Cryptography. Holland: Kluwer Academic Publishers, 1999.
  • 6William Stallings. Cryptography and Network Security Principles and Practices. 4th edition. USA: Prentice Hall, 2005.
  • 7Paterson K G. ID-based signatures from pairings on elliptic curves. Electronics Letters, 2002, 38(18): 1025-1026.
  • 8Accredited Standards Committee X9. Public key cryptography for the financial services industry. The Elliptic Curve Digital Signature Algorithm (ECDSA). American National Standard xg. 62-2005. November 16, 2005.
  • 9Lowe G. An attack on the needham-schroeder public key authentication protocol. Information Processing Letters, 1995, 56(3) : 131-136.
  • 10Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols//Proceedings of the 1st Conference on Computer and Communications Security. Fairfax, Virginia, United States, 1993:62-73.

共引文献30

同被引文献29

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部