期刊文献+

普适环境中的隐私保护认证协议设计 被引量:1

Design of Privacy Preservation Authentication Protocol in Pervasive Environment
下载PDF
导出
摘要 针对普适环境中的认证和隐私保护问题,运用哈希链和部分盲签名技术,提出一种新的隐私保护认证协议。该协议运用哈希链构造信任书,保证每个信任书只能使用一次,利用部分盲签名在信任书中嵌入用户访问次数,对用户的访问次数进行控制。在实现用户匿名访问和双向认证的同时,解决服务滥用和非授权访问问题。仿真结果表明,与同类协议相比,该协议具有更好的安全特性和较高的执行效率。 Aiming at the problem of the authentication and privacy preservation in pervasive environment, a new privacy preservation authentication protocol is proposed based on hash chain and partially blind signature. The protocol uses hash chains to constructe credential access to guarantee every credential access only once, and uses partially blind signature to embed user credential access number to limite user access frequency. The anonymity access and the mutual authentication are achieved, while the abusing service and non-authorization are solved. Simulation result shows that compared with the available scheme, the proposed protocol has higher security and efficiency.
出处 《计算机工程》 CAS CSCD 2012年第6期129-131,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2009AAJ124)
关键词 普适环境 认证 隐私保护 部分盲签名 哈希链 匿名性 pervasive environment authentication privacy preservation partially blind signature hash chain anonymity
  • 相关文献

参考文献8

  • 1范庆娜,姚琳,吴国伟.普适计算中的跨域认证与密钥建立协议[J].计算机工程,2010,36(11):137-139. 被引量:4
  • 2魏志强,康密军,贾东宁,殷波,周炜.普适计算隐私保护策略研究[J].计算机学报,2010,33(1):128-138. 被引量:25
  • 3郭亚军,何炎祥,齐梅.普适计算的隐私保护安全协议[J].华中科技大学学报(自然科学版),2007,35(11):103-105. 被引量:5
  • 4Barber PA, Auer RN, Buchan AM. Understanding and managing ischemic stroke. Can J Physiol Pharmacol,2001,79(3): 283 -296
  • 5Longa EZ, Weinstein PR, Carlson S,et al. Reversible middle cerebral artery occlusion without craniectomy in rats. Stroke,1989,20(1) :84 - 91
  • 6Uno H, Matsuyama T, Akita H,et al. Induction of tumor necrosis factor-alpha in the mouse hippocampus following transient forebrain ischemia. J Cereb Blood Flow Metab, 1997, 17(5) : 491 - 499
  • 7Nawashiro H, Martin D, Hallenbeck JM, et al. Neuroprotective effects of TNF binding protein in focal cerebral ischemia.Brain Res, 1997,778(2) : 265 - 271
  • 8Barone FC, Arvin B, White RF, et al. Tumor necrosis factoralpha: A mediator of focal ischemic brain injury. Stroke,1997,28(6) : 1233-1244

二级参考文献28

  • 1洪帆,郭亚军.资源限制信任协商[J].华中科技大学学报(自然科学版),2006,34(5):23-25. 被引量:7
  • 2郭亚军,洪帆,叶俊民,邱珊珊,宋建华,洪亮.普适计算的信任认证[J].计算机科学,2006,33(8):92-94. 被引量:3
  • 3Halpern J Y, Weissman V. Using first-order logic to reason about policies//Proceedings of the IEEE Computer Security Foundations Workshop. NY, 2003:187-201.
  • 4Damiani E, Di Vimercati S C, Paraboschi S, Samarati P. A fine-grained access control system for XML documents. ACM Transactions on Information and System Security, 2002, 5(2), 169-202.
  • 5Jajodia S, Samarati P, Subrahmanian V S. A logical language for expressing authorizations//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 1997:31- 43.
  • 6Pucella R, Weissmann V. Reasoning about dynamic policies//Proceedings of FoSSaCS-7, 2004: 453-467.
  • 7Dougherty D J, Fisler K, Krishnamurthi S. Specifying and reasoning about dynamic access-control policies//Bhalla S ed. Lecture Notes in Computer Science 4130. Springer, 2006:632-646.
  • 8DeTreville J. Binder, a logic-based security language//Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, CA, 2002:105- 113.
  • 9Jajodia S, Samarati P, Sapino M L, Subrahmanian V. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 2006, 26(2): 214-260.
  • 10Li N, Mitchell J C, Winsborough W H. Design of a rolebased trust-management framework//Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, CA, 2002:114-130.

共引文献32

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部