期刊文献+

分布式网络环境下的跨域匿名认证机制 被引量:10

Cross-domain mechanism of anonymous attestation for distributed network
下载PDF
导出
摘要 TPM计算和存储能力的制约以及直接匿名认证(DAA)的复杂性,导致现有的DAA方案只适用于单可信域,针对此局限,提出了一种适合分布式网络并行、高性能及计算机协同工作特点的跨域匿名认证机制。该机制引入可信第三方——证书仲裁中心(CAC)完成跨域示证者的平台真实性验证,为身份真实的示证者颁发跨域认证证书,该证书一次颁发,多次使用,提高跨域匿名认证效率,同时防止CAC成为系统瓶颈。该模型具有高效、安全、可信等特点,且达到可控的匿名性,并通过通用可组合安全模型分析表明该机制安全地实现了跨域匿名认证。 The restriction of computing and storage of Trusted Platform Module TPM and authentication complexity of Direct Anonymous Attestation DAA results in that DAA mechanism is for single-domain.In order to overcome this limitation a DAA for cross-domain was proposed in this paper considering paralleling high-performance and co-processing in distributed network.The mechanism introduced a trusted third party-Certificate Arbitration Center CAC to verify the reality of requester's platform certificate which issues the cross-domain certificate to the requester with real TPM.The certificate is issued once for repeated usage which prevents CAC becoming system bottleneck.The mechanism reaches the controllable anonymity and the analysis with universally composable security shows that the mechanism realizes the cross-domain anonymous attestation securely.
出处 《计算机应用》 CSCD 北大核心 2010年第8期2120-2124,共5页 journal of Computer Applications
基金 国家863计划项目(2007AA01Z438200) 国家自然科学基金资助项目(60633020) 陕西师范大学研究生创新基金资助项目(2010CXS009)
关键词 可信计算 分布式网络 跨域认证 通用可组合安全 匿名认证 trusted computing distributed network cross-domain mechanism universally composable security anonymous attestation
  • 相关文献

参考文献9

  • 1Trusted Computing Group.Trusted Computing Platform Alliance main specification version 1.1b[EB/OL].[2009-11-10].http://www.Trustedcomputinggroup.org.
  • 2Trusted Computing Group.TPM main part 1 design principles specification version 1.2[EB/OL].[2009-12-01].http://www.Trustedcomputinggroup.org.
  • 3BRICKELL E,CAMENISCH J,CHEN L.Direct anonymous attestation[C] // Proceedings of the 11th ACM Conference on Computer and Communications Security.New York:ACM,2004:132-145.
  • 4BRICKELL E,CHEN L,LI J.Simplified security notions of direct anonymous attestation and a concrete scheme from pairings[R].Cryptology Reprint Archive,2008.
  • 5Trusted Computing Group.Trusted Computing Group TPM vl.2 Specification Changes:a Summary of Changes with respect to the v1.1b TPM Specification[EB/OL].[2009-12-10].http://www.trustedcomputinggroup.org.
  • 6张帆,马建峰,文相在.通用可组合的匿名HASH认证模型[J].中国科学(E辑),2007,37(2):272-284. 被引量:5
  • 7杨超,曹春杰,马建峰.通用可组合安全的Mesh网络认证协议[J].西安电子科技大学学报,2007,34(5):814-817. 被引量:10
  • 8GOLDWASSER S,MICALI S,RIVEST R.A digital signature scheme secure against adaptive chosen-message attacks[J].SIAM Journal on Computing,1998,17(2):281-308.
  • 9曹春杰,杨超,马建峰,朱建明.WLAN Mesh漫游接入认证协议[J].计算机研究与发展,2009,46(7):1102-1109. 被引量:15

二级参考文献43

  • 1季庆光,冯登国.对几类重要网络安全协议形式模型的分析[J].计算机学报,2005,28(7):1071-1083. 被引量:23
  • 2段宁,马建峰.基于IEEE802.11b网卡的WPA与WAPI集成接入方法[J].西安电子科技大学学报,2006,33(5):804-808. 被引量:3
  • 3IEEE Draft Amendment to Standard for Information Technology--Telecommunications and Information Exchange Between Systems--LAN/MAN Specific Requirements--Part 11,Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications:Amendment:ESS Mesh Networking:IEEE P 802.11s/D1.0[S].Piscataway,NJ,IEEE,2007.
  • 4IEEE Standard.Supplement to Standard for Telecommunications and Information Exchange Between Systems--LAN/MAN Specific Requirements--Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications:Specification for Enhanced Security:IEEE 802.11i[S].Piscataway,NJ,IEEE,2004.
  • 5IEEE Standards for Local and Metropolitan Area Networks:Port Based Network Access Control:IEEE Std 802.1X-2004[S].Piscataway,NJ:IEEE,2004.
  • 6Aboba B,Blunk L,Vollbrecht J,et al.Extensible Authentication Protocol (EAP),RFC 3748[S].Fremont,CA,IETF,2004.
  • 7Bellare M,Rogaway P.Entity authentication and key exchange[G] //LNCS 773:Proc of the Advances in Cryptology-Crypto'93.Berlin:Springer.1993:232-249.
  • 8Bellare M,Canetti R,Krawccyk H.A modular approach to the design and analysis of authentication and key-exchange protocols[C]//Proc of the 30th Annual Syrup on the Theory of Computing.New York,ACM,1998:419-428.
  • 9Canetti R.Universally composable security:A new paradigm for cryptographic protocols[C] //Proc of the 42nd IEEE Syrup on Foundations of Computer Science.Piscataway,NJ; IEEE.2001:136-145.
  • 10Canetti R.Krawczyk H.Universally composable notions of key exchange and secure channels[G]//LNCS 2332:Proc of the Advances in Cryptology--EUROCRYPT'02.Berlin:Springer,2002,337-3515.

共引文献23

同被引文献103

引证文献10

二级引证文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部