期刊文献+

一种新的基于身份的多信任域认证模型研究 被引量:8

Research of a New Identity-Based Authentication Model for Multi-Domain
下载PDF
导出
摘要 为解决基于身份的多信任域跨域认证问题,在分析了IBC和PKI认证框架特点的基础上,提出了一种新的基于身份的多信任域认证模型。该模型综合利用IBC和PKI的优点,实现了不同参数的IBC信任域的跨域认证问题,并通过BAN逻辑对本文设计的跨域认证协议进行了详细的分析和证明。分析结果表明,该模型能够实现跨域认证需求,跨域认证协议是安全有效的。 To solve the problems of authentication for crossing identity-based domains,a new identity-based authentication model for multi-domain is proposed based analyzing the characteristics of IBC and PKI authentication frame-works.Combining the strongpoint of IBC and PKI,new model solves the prombles of authentication for cross-domain when each domain has different parameter. In the end,the cross-domain authentication protocol in this paper is analyzed detailedly by BAN logic. It is showed that the proposed model can achieve the requirements for cross-domain authentication,and the protocol is secure and effective.
机构地区 [
出处 《计算机安全》 2010年第8期15-18,共4页 Network & Computer Security
关键词 基于身份 公钥基础设施 跨域认证 协议 Identity-Based Public Key Infrastructure authentication cross-domain protocol
  • 相关文献

参考文献8

  • 1PKI Primer[EB/OL].http://thefdp.org/FDP_Jan05_eRA.pdf.
  • 2A Shamir.ldentity-based cryptosystems and signature schemes[A].In Blakley G T,Chaum D.LNSC 196[C].Berlin:Springer-Verlag,1984:47-53.
  • 3Michael Burrows,Martin Abadi,Roger M Needham.A Logic of Authentication.ACM Transaction on Computer System,1990,8(1):18-336.
  • 4L Chen,K Harrison,D Soldera,N Smart.Applications of multiple trust authorities in pairing based cryptosystems[A].In Proceedings of Infrastructure Security[C].Berlin:Springer-Verlag,2002.260-275.
  • 5J Horwitz,B Lynn.Toward hierarchical identity-based encryption[G].In:Advances in Cryptology-Eurocrypt 102,LNCS 2332.Berlin:Springer-Verlag,2002.466-481.
  • 6C Gentry,A Silverberg.Hierarchical ID-based cryptography[G].In:Advances in Cryptology-Aisacrypt102,LNCS 2501.Berlin:Springer-Verlag,2002.548-566.
  • 7彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 8路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32

二级参考文献28

  • 1彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 2ANSI X. 962. Public key cryptography for the financial services industry:the elliptic curve digital signature algorithm (ECDSA) [ S ]. 1999.
  • 3Shamus software ltd, multiprecision integer and rational arithmetic C/C ++ library [OL]. http ://indigo. ie/-mscott/.
  • 4R Butler, V Welch, D Engert, I Foster, S Tuecke, J Volmer, C Kesselman. A national-scale authentication infrastructure [ J ]. IEEE Computer, 2000,33 ( 12 ) : 60 -66.
  • 5I Foster, C Kesselman,G Tsudik, S Tuecke. A security architecture for computational GRID [ A ]. In Proceedings of the 5th ACM Conference on Computer and Communications Security [ C ]. New York: ACM press,1998, 83 - 92.
  • 6M Thompson, A Essiari, S Mudumbai. Certificate-based authorization policy in a PKI environment [ J ]. ACM Transactions on Information and System Security,2003,6(4) :566 -588.
  • 7N Nagaratnam, P Janson, J Dayka, A Nadalin, F Siebenlist,V Welch, I Foster, S Tuecke. The security architecture for open GRID services[OL]. http://www. cs.virginia.edu/-humphrey/ogsa-sec-wg/OGSA-SecArch-v1-07192002. pdf. July ,2002.
  • 8P Gutmann. PKI: it's not dead, just resting [ J ]. IEEE Computer,2002,35(8) :41 -49.
  • 9J Linn, M Branchaud. An examination of asserted PKI issues and proposed alternatives[ A]. In Proceedings of the 3rd Annual PKI R & D Workshop [ C ]. Gaithers-burg : NIST ,2004.
  • 10W Mao. An identity-based non-interactive authentication framework for computational grids [ R ]. Hewlett-Packard Laboratories,technical report HPL-2004-096,2004.

共引文献77

同被引文献49

  • 1张胜,徐国爱,胡正名,杨义先.Ad hoc网络信任模型的研究[J].计算机应用研究,2005,22(12):100-102. 被引量:6
  • 2路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 3彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 4LI Fa-gen, HU Yu-pu, ZHANG Chuan-rong. An 'identity-based signcryption scheme for multi-domain Ad hoc networks [ C ]//Lecture Notes in Computer Science, vol 4521. 2007:373-384.
  • 5LI Fa-gen, SHIRASE M, TAKAGI T. Efficient muhi-PKG ID-based signcryption for Ad hoc networks [ C ]//Lecture Notes in Computer Science, vol 5487. 2009:289-304.
  • 6CHEN L,KUDLA C. Identity based authenticated key agreement protocols from pairings [ C ]//Proc of the 16th IEEE Computer Security Foundations Workshop. 2003:219-233.
  • 7LEE H, KIM D, KIM S, et al. Identity-based key agreement protocols in a multiple PKG environment [ C ]//Lecture Notes in Computer Sci ence, vol 3783. 2005:877-886.
  • 8KIM S,LEE H, OH H. Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment [ C ]// Lecture Notes in Computer Science, vol 3783. 2005:323-335.
  • 9ABADI M, FOURNET C. Mobile values, new names and secure communication[ C ]//Proc of the 28th ACM Symposium on Principles of Programming Languages. 2001:104-115.
  • 10ABADI M, BLANCHET B, FOURNET C. Just fast keying in the Pi calculus [ J]. ACM Trans on Information and system Security, 2007,10(3) :1-54.

引证文献8

二级引证文献65

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部