期刊文献+

基于身份加密(IBE)技术研究 被引量:13

Study on Identity-Based Encryption Technology
原文传递
导出
摘要 随着信息安全中的信任和认证技术的发展,无线应用的广泛使用,传统密码认证和密钥分发技术在无线信道资源受限的情况下,使用和管理复杂,基于身份加密(IBE)技术能够很好地解决这些新问题。介绍了IBE技术的发展背景和现状,分析了对称加密、PKI和IBE的密钥管理方式,提出了IBE技术在实际应用中需要解决的问题,给出了相应的解决思路。并针对密钥托管与用户私钥安全分发问题,分析和比较了典型解决方案及其适用环境。 With the development of confidence and authentication technologies in information security and the wide application of wireless technology,the application of traditional key authentication and distribution technology is complex and limited, IBE could effectively solve these problems. The development background and present situation of IBE technology is described, the key management technology for symmetric encryption,PKI and IBE is analyzed,the problems of IBE technology in application are presented,and the solutions to those problems are also given. Finally,aiming at the key escrow and the distribution of users' private key,the typical solutions and applications are analyzed and compared.
出处 《信息安全与通信保密》 2011年第4期64-66,73,共4页 Information Security and Communications Privacy
关键词 基于身份加密 密钥管理 私钥分发 IBE key management private key distribution
  • 相关文献

参考文献2

二级参考文献10

  • 1石艳荣,贺永强.PKI和基于身份加密的比较[J].微计算机信息,2008,24(3):83-84. 被引量:8
  • 2Shamir A. Identity-based cryptosystem and signature schemes[ C]//CRYPTO 1984. Berlin: Springer-Verlag, 1984:47-53.
  • 3Boneh D, Franklin M. Identity based encryption from Well pairing [C] //CRYPTO 2001. Berlin: SpringerVerlag, 2001: 213-229.
  • 4Adams C, Lloyd S. Understanding pubkic-key infrastructure: concepts, standards and deployment considerations [ M ]. [ S. l. ] : Macmillan Technical Publishing, 1999: 78-128.
  • 5Libert B, Quisquater J. J. What is possible with identity based cryptography for PKIs and what still must be improved [ C ] // LNCS 3093. Berlin: Springer-Verlag, 2004 : 57-70.
  • 6Chen L, Harrison K, Soldera D, et al, Applications of multiple trust authorities in pairing based cryptosystems [ C]//LNCS 2437, Berlin: Springer-Verlag, 2002 : 260- 275.
  • 7Gentry C. Certificate-based encryption and the certificate revocation problem[C] //Advanees in Cryptology-EUROCRYPT 2003. Berlin: Springer-Verlag, 2003: 272-293.
  • 8Al-Riyami S, Paterson K. Certificateless public key cryptography[C]//Advances in Cryptology-Asiacrypt 2003. Berlin: Springer-Verlag, 2003: 452-472.
  • 9Lee B, Boyd E, Daeson E, et al. Secure key issuing in ID-based cryptography[ C] // Proceedings of the Second Australian Information Security Workshop-AISW 2004. Dunedin: Australian Computer Society, Inc, 2004: 69- 74.
  • 10Desmedt Y, Frankel Y. Threshold cryptosystem[C]// Advances in Cryptology-Crypto 1989. Berlin: SpringVerlag, 1989: 231-236.

共引文献10

同被引文献127

引证文献13

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部