期刊文献+

基于随机重用可认证SKN的云计算快速安全调度

FAST AND SECURE SCHEDULING IN CLOUD COMPUTING BASED ON AUTHENTICABLE SNK WITH RANDOM REUSE STRATEGY
下载PDF
导出
摘要 针对应用互联网密钥交换(IKE)方法要对大量数据和高密度运算执行非对称密钥密码学操作而导致效率不高的问题,提出一种基于随机重用的身份认证密钥交换方法。首先分析云计算环境中云控制器的作用;然后设计该方法的三个独立组件;最后对其进行安全性分析。理论分析和实验结果均表明,相比IKE方案,该方法通过动态减少了时间消耗和计算负载,并且无需牺牲安全级别即可显著提高效率。 The Internet Key Exchange (IKE) scheme suffers from low efficiency because it performs asymmetric-key cryptological opera- tions over a large amount of data and high-density operations. For this issue, we proposed a random reuse-based authentication key exchange scheme. First, we analysed the role of cloud controller in cloud computing. Then, we designed three independent components of the scheme. Finally, we analysed the security of the scheme. Theoretical analyses and experimental results all demonstrated that compared with the IKE scheme, this one significantly improved the efficiency by dynamically reducing time consumption and computation load without sacrificing the level of security.
出处 《计算机应用与软件》 CSCD 2015年第9期286-291,共6页 Computer Applications and Software
基金 浙江省教育厅科研项目(Y201431679) 浙江省可视媒体智能处理技术研究重点实验室开放基金项目(2013056)
关键词 会话密钥 云计算 密钥交换 随机重用 安全调度 Session key Cloud computing Key exchange Random reuse Secure scheduling
  • 相关文献

参考文献15

二级参考文献169

  • 1杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 2XIANG Guang-li,CHEN Xin-meng,ZHU Ping,MA Jie.A Method of Homomorphic Encryption[J].Wuhan University Journal of Natural Sciences,2006,11(1):181-184. 被引量:8
  • 3尹春勇,李秦伟,孙汝霞.一种秘密同态的改进模式[J].贵州工业大学学报(自然科学版),2007,36(1):68-70. 被引量:3
  • 4尹春勇,李坚石,孙汝霞.安全科学计算系统SSCS实现[J].计算机工程与设计,2007,28(13):3070-3073. 被引量:1
  • 5Bellarc M, Rogaway P. Entity Authentication and Key Distribution[C]//Proc. of CRYPTO'93. [S. I.]: Springer, 1993: 232.
  • 6LaMaccbia K, Lauter K, Mityagin A. Stronger Security of Authenticated Key Exchange[C]//Proc. of ProvSec'07: Heidelberg, Germany: Springer, 2007: 1-16.
  • 7Cash D, Kiltz E, Shoup V. The Twin Diffie-Heltman Problem and Applications[C]//Proc. of EUROCRYPT'08. Heidelberg, Germany: Springer, 2008: 127-145.
  • 8Ustaoglu B. Obtaining a Secure and Efficient Key Agreement Protocol for (H)MQV and NAXOS[J]. Designs, Codes and Cryptography, 2008, 46(3): 329-342.
  • 9Krawczyk H. HMQV: A High-performance Secure Diffie-Hellman Pretocol[C]//Proc. of CRYPTO'05. Heidelberg, Germany: Springer, 2005: 546-566.
  • 10Lee J, Park J. Authenticated Key Exchange Secure Under the Computational Diffie-Hellman Assumption[EB/OL]. (2009-04-08). http://eprint.iacr.org/2008/344.

共引文献235

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部