期刊文献+

基于Diffie-Hellman的安全的10G EPON认证方案 被引量:1

10Gb/s EPON efficient and secure authentication scheme based on diffie-hellman
下载PDF
导出
摘要 随着接入网的发展,10GEPON获得关注。由于其拓扑结构仍然是点到多点,且下行数据是广播发送,因而将会遭受窃听和伪装攻击。为了消除这些安全威胁,提出了一个完整的安全方案,包括一个双向认证方法和一种结合了单向哈希(Hash)函数的加密算法。该认证方法可以在注册过程中验证OLT和ONU,以阻止非法用户加入网络,同时安全地建立用于后续加密的会话密钥。该方案的安全性基于计算性Diffie-Hellman假设和抗碰撞函数难解性。 With the development of access network, 10G EPON has gained attention. As its topology structure is still point-to-multi-point and the downstream data is broadcasted, it will suffer from eavesdropping and mas- querading attack. To eliminate these safety threats, this paper proposes an integrated security scheme including a bilateral authentication method and an encryption algorithm combine with one-way hash function. The au- thentication method can verify OLT and ONU during the registration process, preventing illegal users joining the network, and safely establish a secret key used for encrypting as well. The proposed scheme's security is based on the computational Diffie-Hellman assumption and the target collision resistant hash functions.
出处 《光通信技术》 CSCD 北大核心 2014年第7期49-52,共4页 Optical Communication Technology
基金 国家自然科学基金(编号:61262079)资助 2013年国家级大学生创新训练项目基金(编号:201310404016)资助
关键词 双向认证 时间戳 10GEPON DIFFIE-HELLMAN bilateral authentication timestamp 10G EPON Diffie-Hellman
  • 相关文献

参考文献8

二级参考文献26

  • 1SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 2WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:23
  • 3SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 4KRAMER G. What is Next for Ethemet PON?[C]. The 5th Intemational Conference on Optical Intemet Korea,COIN,2006,49-54.
  • 5HAJDUCZENIA M,IN?CIO P R M,SILVA H J A ,et al. 10G EPON Standardization in IEEE 802.3av Project[C]. OFC/NFOEC, 2008.
  • 6IEEE Std 802.3-2005 ,Part 3 :clause 64.3: Multipoint Control Protocol (MPCP)[S].
  • 7IEEE Draft P802.3av/D3.4, Part 3 : clause 77.3 : Multipoint Control Protocol(MPCP)[S].
  • 8SHOUP V, RUBIN A. Session key distribution using smart cards [C]// EUROCRYPT'96: Proceedings of the 15th Annual Interna- tional Conference on Theory and Application of Crypto~aphic Tech- niques. Berlin: Springer-Verlag, 1996:321-331.
  • 9WILSON S B, MENEZES A. Authenticated Diffie-Hellman key a- greement protocols[ C]//SAC'98: Proceedings of the Selected Areas in Cryptography. Berlin: Springer-Verlag, 1999:339-361.
  • 10WILSON S B, JOHNSON D, MENEZES A. Key exchange protocols and their security analysis[ C]// Proceedings of Sixth IMA Interna- tional Conference on Cryptography and Coding, LNCS 1355. Berlin: Springer-Verlag, 1997:30-45.

共引文献8

同被引文献11

  • 1YIN A, WANG S. A novel encryption scheme based on timestamp in gigabit Ethemet passive optical network using AES-128 [J]. Optik-Intemational Journal for Light and Electron Optics, 2014, 125 (3): 1361-1365.
  • 2YAN Y, DITTMANN L. Security Challenges and Solutions for Telemedicine over EPON [C]//eTELEMED 2014, The Sixth International Conference on eHealth, Telemedicine, and Social Medicine, Mar 22-27, 2014. Barcelona, Spain:2014.
  • 3G-OFF Y L, FUJIMOTO Y, MURAKAMI K, et al. Encryption layer comparison[J]. IEEES02. 3ah Ethernet in the first mile, White Paper, 2009, (1): 119-122.
  • 4ZI-YI F, ZONG-JIE L. Study of authentication and eneryption scheme in EPON [J]. Proc. ISECS, 2010(7): 176-178.
  • 5YAN Y I N, YUE-JIN Z. Research on EPON Two-way Authenticated Eneryption Scheme based on the MAC [J]. International Journal of Digital Content Technology & its Applications, 2012, 6(21 ): 5-7.
  • 6BARRETO P S L M, LIBERT B, MCCULLAGH N, et al. Efficient and provably-secure identity-based signatures and signcryption from bilinear maps [M].Springer Berlin Heidelberg:Advances in Cryptology-ASIACRY- PT 2005,2005.
  • 7MIAO S, ZHANG F, LI S, et al. On security of a certificateless signcryption scheme[J]. Information Sciences, 2013, 232(20): 475-481.
  • 8殷爱菡,朱明,展爱云,张青苗.基于NTRU的EPON认证方案研究[J].光通信技术,2013,37(3):24-26. 被引量:3
  • 9殷爱菡,王胜凯.基于改进的AES算法的EPON安全方案研究[J].华东交通大学学报,2013,30(4):35-39. 被引量:5
  • 10张涛,汪敏.SIEPON系统中ONU认证的研究和实现[J].光通信技术,2014,38(3):12-14. 被引量:2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部