期刊文献+

PKI信任模型的条件谓词逻辑推理 被引量:3

A conditional predicate calculus logic for PKI trust model analysis
下载PDF
导出
摘要 本文提出了一种用条件谓词逻辑来表示和推理PKI信任关系的方法。通过区别认证机构(CA)与用户实体的不同,用四个谓词表示不同个体之间的信任关系,并给出关于公钥绑定真实性和CA信任传递的推理规则。认证路径长度和证书策略是对信任关系的限制,将其作为约束条件加到谓词逻辑中更好地反映出现实中的信任。利用条件谓词逻辑,既能够对一个PKI的信任模型进行整体描述,也可从用户的角度对CA的信任度和实体公钥的真实性进行精确推理,弥补了图形法的不足。 In this paper, a conditional predicate calculus logic was proposed for representing and reasoning about PKI trust model. While distinguishing the difference of entities and CAs, four predicates are defined to represent the trust relationships between them, and reasoning rules about the authenticity of entities' public keys and the trustworthiness of CAs are given. Certification path length and certificate policies are constraints of trust, it is reasonable to add them as conditions to the logic. Using our approach, not only a PKI's trust model can be depicted in a whole manner, but also a relying party can precisely reason about the authenticity of entities' public key and the trustworthiness of CAs from his point of view. It offsets the fault of graphic method.
出处 《通信学报》 EI CSCD 北大核心 2002年第11期14-20,共7页 Journal on Communications
关键词 公开密钥 基础设施 信任模型 谓词逻辑 密码学 PKI trust trust model predicate logic
  • 相关文献

参考文献9

  • 1[1]ISO/IEC 9594-8/ITU-T Recommendation X 509-1997(E), Information Technology - Open Systems Interconnection - The Directory: Authentication Framework[S].
  • 2[2]HOUSLEY R, FORD W, POLK W, et al. RFC-1999, 2459. Internet X 509 Public Key Infrastructure, Certificate and CRL Profile[S].
  • 3[3]MAURER U. Modeling a public-key infrastructure[A]. European Symp Res Computer Security (ESORICS'96)[C]. 1996. 325-350.
  • 4[4]BAKKALI H EL, KAITOUNI B I. A predicate calculus logic for the PKI trust model analysis[A]. IEEE International Symposium on Network Computing and Applications[C]. 2001. 368 -371.
  • 5[5]BAKKALI H EL, KAITOUNI B I. A logic-based reasoning about PKI trust model[A]. Sixth IEEE Symposium on Computers and Communications[C]. 2001. 42-48.
  • 6[6]Pretty good privacy user's guide, version7.0[EB/OL]. Distributed with the PGP software, 2001.
  • 7[7]CHOKHANI S, FORD W. RFC 2527-1999, Internet X 509 Public Key Infrastructure Certificate Policy and Certification Practices Framework[S].
  • 8[8]CHADWICK D W, YOUNG A J, CICOVIC N K. Merging and extending the PGP and PEM trust models - the ICE-TEL trust model[J]. IEEE Networks Mag, 1997, (May): 16-24.
  • 9[9]BURR W E. Public key infrastructure (PKI) technical specifications: part a - technical concept of operations, working draft [EB/OL]. http://csrc.nist.gov/pki/twg/baseline/pkicon20b.pdf, 1998-09-04.

同被引文献22

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部