期刊文献+

基于无证书的P2PSIP可认证密钥协商方案

Certificate-Free P2PSIP Authenticated Key Agreement Scheme
下载PDF
导出
摘要 针对P2PSIP协议的分布式特点、低呼叫时延要求和面临的安全威胁,基于无证书公钥密码体制下的可认证密钥协商和签名,提出了一种高效的P2PSIP可认证密钥协商方案,并分析了该方案的正确性、安全性和运算效率。该方案实现了P2PSIP呼叫的可认证密钥协商,克服了使用公钥基础设施带来的缺点,方案具有较低的通信开销且无对运算,因此对比其它方案具备较高的运算效率,降低了呼叫时延并提升了用户体验效果。 In view of the distributed characteristics,low call delay requirements and security threats of P2PSIP protocol,based on authenticated key agreement and signature in certificate-free public key cryptosystem,an efficient P2PSIP certifiable key agreement scheme is proposed.The correctness,security and computational efficiency of the scheme are analyzed.The scheme achieves authenticated key agreement for P2PSIP call,overcomes the disadvantage of using public key infrastructure,and has lower communication overhead and no pairing operation.Therefore,compared with other schemes,this scheme has higher operational efficiency;reduces call delay and improves user experience effect.
作者 贾永兴 廖飞 程教育 胡鹏 JIA Yong-xing;LIAO Fei;CHENG Jiao-yu;HU Peng(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2019年第8期1971-1974,共4页 Communications Technology
关键词 点对点会话初始协议 无证书公钥密码 认证 密钥协商 P2PSIP certificate-free public key cryptography authentication key agreement
  • 相关文献

参考文献2

二级参考文献19

  • 1刘华,王琨.基于PKI的SIP协议安全的研究[J].电子科技,2005,18(2):37-40. 被引量:13
  • 2D.Bryan,P.Matthews and E.Shim,et.Concepts and Terminology for Peer to Peer SIP,IETF:draft-ietf-p2psip,July 2008.http://tools.ietf.org/id/draft-ietf-p2psip-concepts-02.txt
  • 3D.Bryan,BB.Lowekamp and Cullen Jennings,SOSIMPLE:A Serverless,Standards-based,P2P SIP Communication System [C], AAA-IDEA 2005. IEEE Press, 2005, pp:42 - 49
  • 4Ingmar Baumgart, P2PNS: A Secure Distributed Name Service for P2PSIP [ C ], 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications, 2008. IEEE Press, 2008, pp:480 -485
  • 5M.Matuszewski,P.Laitinen,Security requirements in P2PSIP,IETF:draft-matuszewski-p2psip,November,2007.http://tools.ietf.org/id/draft-matuszewski-p2psip-security-requirements-02.txt
  • 6John R. Douceur, The Sybil Attack [ C ], Peer- to -peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7 - 8, 2002. Springer,2002, pp: 251 - 260.
  • 7Kundan Singh,Henning Schulzrinne.Peer-to-Peer Internet Telephony using SIP.Columbia University Technical Report CUCS-044-04,October,2004,http://www1.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-044-04.pdf
  • 8Seedorf. J. Using Cryptographically Generated SIP - URIs to protect the Integrity of Content in P2P - SIP[ EB/OL]. Third Annual VolP Security Workshop, Berlin, Germany, June 2006, http://www, informatik, uni- hamburg, de/SVS/papers/Using cryptographically generated SIP - URIs. pdf
  • 9Junzuo Lai and Weidong Kou. Self- Generated -Certificate Public Key Encryption Without Pairing [ C ].PKC 2007, Beijing, China, April 16 - 20, 2007. Germany: Springer - Verlag, 2007, LNCS 4450, pp. 476 -489.
  • 10Xu An Wang , Xiaoyuan Yang and Yiliang Han. Cryptanalysis of Self - Generated - Certificate Public KeyEncryption without Pairing in PKC07 [ EB/OL], Cryptology ePrint Archive: Report 2008/191, 2008. http://eprint, iacr. org/2008/191

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部