期刊文献+

一种混合密码体制下的密钥管理方案 被引量:4

A Key Management Scheme of Hybrid Cryptosystem
原文传递
导出
摘要 基于单一密码体制下的密钥管理系统都存在一些缺陷,不能完美地满足日益增长的应用需求。对于非对称密码体制的组合公钥技术,在安全性要求较高、相对封闭的应用环境下,有较好的实用特性。采用对称密码体制和公钥密码体制相结合的技术手段,设计出一个混合密码体制下的新型密钥管理系统,包括密钥管理模型、系统功能、密钥周期管理策略等,并对该系统的各项性能(安全性、高效性、灵和性、可扩展性)进行了详细的论述。 Cryptosystem based on a single key management system has some shortcomings and thus could not completely satisfy the growing application needs. The combined technology of asymmetric public key cryptography is of fairly good practicability for the relatively closed application environment with high security requirement. In combination of symmetric cryptography and public key cryptography, a hybrid cryptosystem is produced, and a novel key management system for the new system also designed, including key management model, system functions, key lifecycle management strategies. And the system performance (safety, efficiency, flexibility and scalability) is discussed in detail in this paper.
出处 《通信技术》 2012年第1期122-124,共3页 Communications Technology
关键词 组合公钥 密码体制 密钥管理系统 combined public key cryptosystem key management system
  • 相关文献

参考文献6

二级参考文献11

  • 1Ian Foster.Globus Toolkit Version 4: Software for Service-Oriented Systems[J].Journal of Computer Science & Technology,2006,21(4):513-520. 被引量:44
  • 2YAN Fei,ZHANG Huanguo,SUN Qi,SHEN Zhidong,ZHANG Liqiang,QIANG Weizhong.An Improved Grid Security Infrastructure by Trusted Computing[J].Wuhan University Journal of Natural Sciences,2006,11(6):1805-1808. 被引量:3
  • 3Foster I, Kesselman C. The grid: blueprint for a new computing infrastructure [M]. San Fransiseo: Morgan Kaufmann, 1999.
  • 4Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids[C]// ACM Conference on Computers and Security, 1998. San Fran- cisco: ACM Press, 1998: 83-92.
  • 5Gutmann P. PKI: it's not dead, just resting[J]. IEEE Computer, 2002, 35(8): 41-49.
  • 6Zhu L, Jaganathan K, Hartman S. The kerberos version 5 generic security service application program interface (GSS-API) mechanism., version 2[S]. RFC 4121, 2005. http://www. ietf. org/rfc/rfc4121. txt.
  • 7Housley R. Internet X. 509 public key infrastructure certificate and CRL profile[S]. RFC 2459, 2000. http ://www. ietf. org/rfc/rfc2459. txt.
  • 8Cafaro M, Lezzi D, Fiore S, et al. The GSI plug-in for gSOAP., building cross-grid interoperable secure grid services[J]. Lecture Notes in Computer Science, 2008, 4 967: 894-901.
  • 9[1]南相浩,陈钟.网络安全技术概论[M].北京:国防工业出版社,2003.
  • 10[3]Bonch D,Franklin M.Identity-based Encryption from the Weil Pairing[J].Advances in Cryptology-CRYPTO'01,Lecture Notes in Computer Science,2001,21(39):213-229.

共引文献10

同被引文献28

  • 1宋磊,罗其亮,罗毅,涂光瑜.电力系统实时数据通信加密方案[J].电力系统自动化,2004,28(14):76-81. 被引量:30
  • 2FIAT A, NAOR M. Broadcast Encryption[J]. CRYPTO, 1993(8) : 480-491.
  • 3BONEH D, GENTRY C, WATERS B. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys[J]. CRYPTO, 2005(8): 258 - 275.
  • 4BONEH D, SILVERBERG A. Applications of Multilinear Forms to Cryptography[J]. Contemporary Mathematics, 2003, 324(6): 71-90.
  • 5ANSI x9.17 (Revised). Americannational standard for finan- cial institution key management[ S]. 1985.
  • 6Ghodosi H, Pieprzyk J, Safavi-Naini R, et al. On construc- tion of cumulative secret sharing schemes [ C ]//Proc of ACISP. Is. 1. ] :~s.n. ] ,1998.
  • 7Thomas R, Sandhu R. Task-based authorization controls (TBAC) :A family of models for active and enterprise-ori- ented authorization management[ C ]//Proc of eleventh inter- national conference on database security. Lake Tahoe, Cali- fornia,USA: [ s. n. ], 1997.
  • 8郑金涛.基于KMS的直接密钥托管方案的设计与实现[D].武汉:华中科技大学,2007.
  • 9郑金涛.基于密钥管理的密钥分发解决方案探析[D].武汉:华中科技大学,2007.
  • 10Ristenpart T, Tromer E, Sbacham H, et al. Hey, You, Get off of My Cloud : Exploring Information I:akage in Third- Party Compute Clouds [J]. In Proceedings of the 16th ACM Conference on Computer and Communications Seeurity, ACM, 2009, 51(1):199-212.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部