期刊文献+

一种高效的P2PSIP认证与密钥协商机制 被引量:2

Efficient authentication and key agreement mechanism for P2PSIP
下载PDF
导出
摘要 针对P2PSIP分布式无中心的特点,提出一种基于无证书公钥密码技术的认证与密钥协商机制,并对其正确性、安全性和性能进行了分析讨论。该方案满足普遍认可的密钥协商安全需求,而且没有使用双线性对运算,能有效降低节点的计算开销。与已有方案相比,该方案在保持较高安全性的同时具有更高的运行效率。 In order to fit with the distributed and decentralized characteristics of P2PSIP, this paper proposed an authentica- tion and key agreement mechanism based on certificateless public-key cryptography, and discussed its correctness, security and performance. This scheme satisfied the common admissive security demands in key agreement and reduced computation costs for not using bilinear pairings. As compared to the existing schemes, the new scheme maintains high security and has higher efficiency.
作者 施苑英
出处 《计算机应用研究》 CSCD 北大核心 2011年第1期234-236,共3页 Application Research of Computers
基金 西安邮电学院中青年科研基金资助项目(ZL2010-13)
关键词 对等会话初始协议 无证书公钥密码体制 无双线性对 认证 密钥协商 P2PSIP certificateless public-key cryptography(CL-PKC) without pairing authentication key agreement
  • 相关文献

参考文献10

  • 1ROSENBERG J, SCHULZRINNE H, CAMARILLO G, et al.RFC 3261, SIP: session initiation protocol[S].2002.
  • 2SINGH K, SCHULZRINNE H.Peer-to-peer Internet telephony using SIP[C]//Proc of International Workshop on Network and Operating Systems Support for Digital Audio and Video.New York:ACM Press, 2005:63-68.
  • 3SCHOLLMEIER R.A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications[C]//Proc of the 1st International Conference on Peer-to-Peer Computing.Washington DC: IEEE Computer Society, 2001:101-102.
  • 4SONGHai-bin,MATUSZEWSKIM,YORKD.P2PSIPsecurityoverviewandriskanalysis[EB/OL].(2009-09-28)[2010-01-11].http://tools.ietf.org/id/draft-matuszewski-p2psip-security-requirements-06.txt.
  • 5JAMPATHOM C.P2PSIP security[D].Espoo:Helsinki University of Technology, 2008.
  • 6WANG Feng-jiao, ZHANG Yu-qing.A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography[J].Computer Communications, 2008, 30(10):2142-2149.
  • 7张睿,蒋华,杨亚涛.一种基于SGC-PKE的P2PSIP可认证密钥协商方案[J].北京电子科技学院学报,2008,16(4):49-55. 被引量:4
  • 8STINSON D R, WU Jiang. A zero-knowledge identification and key agreement protocol [EB/OL ]. ( 2007- 07- 18 ) [ 2010- 03- 12 ]. http ://epfint. iacr. org/2007/116. pdf.
  • 9SCHNORR C P.Efficient identifications and signatures for smart cards[C]//Proc of the 9th Annual International Cryptology Conference on Advances in Cryptology.London: Springer-Verlag, 1990:239-252.
  • 10BAEK J, SAFAVI-NAINI R, SUSILO W.Certificateless public key encryption without pairing[C]//Proc of the 8th International Confe-rence on Information Security.Berlin: Springer, 2005:134-148.

二级参考文献11

  • 1刘华,王琨.基于PKI的SIP协议安全的研究[J].电子科技,2005,18(2):37-40. 被引量:13
  • 2D.Bryan,P.Matthews and E.Shim,et.Concepts and Terminology for Peer to Peer SIP,IETF:draft-ietf-p2psip,July 2008.http://tools.ietf.org/id/draft-ietf-p2psip-concepts-02.txt
  • 3D.Bryan,BB.Lowekamp and Cullen Jennings,SOSIMPLE:A Serverless,Standards-based,P2P SIP Communication System [C], AAA-IDEA 2005. IEEE Press, 2005, pp:42 - 49
  • 4Ingmar Baumgart, P2PNS: A Secure Distributed Name Service for P2PSIP [ C ], 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications, 2008. IEEE Press, 2008, pp:480 -485
  • 5M.Matuszewski,P.Laitinen,Security requirements in P2PSIP,IETF:draft-matuszewski-p2psip,November,2007.http://tools.ietf.org/id/draft-matuszewski-p2psip-security-requirements-02.txt
  • 6John R. Douceur, The Sybil Attack [ C ], Peer- to -peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7 - 8, 2002. Springer,2002, pp: 251 - 260.
  • 7Kundan Singh,Henning Schulzrinne.Peer-to-Peer Internet Telephony using SIP.Columbia University Technical Report CUCS-044-04,October,2004,http://www1.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-044-04.pdf
  • 8Seedorf. J. Using Cryptographically Generated SIP - URIs to protect the Integrity of Content in P2P - SIP[ EB/OL]. Third Annual VolP Security Workshop, Berlin, Germany, June 2006, http://www, informatik, uni- hamburg, de/SVS/papers/Using cryptographically generated SIP - URIs. pdf
  • 9Junzuo Lai and Weidong Kou. Self- Generated -Certificate Public Key Encryption Without Pairing [ C ].PKC 2007, Beijing, China, April 16 - 20, 2007. Germany: Springer - Verlag, 2007, LNCS 4450, pp. 476 -489.
  • 10Xu An Wang , Xiaoyuan Yang and Yiliang Han. Cryptanalysis of Self - Generated - Certificate Public KeyEncryption without Pairing in PKC07 [ EB/OL], Cryptology ePrint Archive: Report 2008/191, 2008. http://eprint, iacr. org/2008/191

共引文献3

同被引文献27

  • 1SINGH K, SCHULZRINNE H. Peer-to-peer Internet telephony using SIP[ C]//Proc of International Workshop on Network and Operating Systems Support for Digital Audio and Video. New York:ACM Press, 2005:63- 68.
  • 2JENNINGS C, LOWEKAMP B, RESCORLA E, et al. Resource loca- tion and discovery (RELOAD) [ EB/OL]. (2008-02-24) [2010-09- 12 ]. http ://tools. ietf. org/html/draft-bryan-p2psip-reload-03.
  • 3ROSENBERG J, SCHULZRINNE H, CAMARILLO G,et al. RFC 3261, SIP: session initiation protocol [ S ]. [ S. 1. ] : IETF, 2002.
  • 4SONG H, MATUSZEWSKI M, YORK D. P2PSIP security overview and risk analysis [ EB/OL ]. ( 2009-09-28 ) [ 2010-01-11 ]. http ://tools. ietf. org/id/draft-matuszewski-p2psip-security-requirements-06, txt.
  • 5CHALLAL Y, SEBA H. Group key management protocols: a novel taxonomy[ J]. International Journal of Information Technology, 2005,2(1) :105-118.
  • 6WANG Yao,ZHANG Chun-hong, MA Tao, et al. Design and evalua- tion of reliability mechanisms in P2PSIP-based conference system [ C ]//Proc of the 4th International Conference on Wireless Communi- cations, Networking and Mobile Computing. Washington DE: IEEE Press, 2008: 3261-3266.
  • 7BARIC N, PFITZMANN B. Collision-free accumulators and fail-stop signature schemes without trees[ C ]//Proc of EUROCRYPT'97. Ber- lin: Springer-Verlag, 1997: 480-494.
  • 8RING J, CHOO K-K R, FOO E, et al. A new authentication mecha- nism and key agreement protocol for SIP using identity-based crypto- graphy [ C ]//Proc of AusCERT Asia Pacific Information Technology Security Conference. Brisbane: University of Queensland Publicatian, 2006.57 - 72.
  • 9FANDRIANTO A. SIPDHT: an open source project for P2PSIP[ EB/ OL]. (2007-07) [ 2010-10-02 ]. http://sipdht, sourceforge, net/ sipdht2/report-fandrianto-sipdht2, pdf.
  • 10温巧燕,郭奋卓,朱甫臣.量子保密通信协议的设计与分析[M].北京:科学出版社,2009:59-60.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部