期刊文献+

基于前向安全数字签名的交叉认证方案 被引量:1

The Cross Authentication Scheme Based on Forward-secure Digital Signature
下载PDF
导出
摘要 影响PKI发展的主要原因之一是CA对证书管理的困难性。该文基于前向安全数字签名的思想,提出了解决这个问题的新方案。该方案利用前向安全数字签名理论和技术,保证了一个PKI系统在CA签名密钥泄露的情况下损失最小;在CA需要更换签名密钥时效率最高;签名中所含有的时间段信息可以取代时间戳,从而省去了其他PKI系统中必须具有的统一的时间戳服务器;保证了证书路径确认的有效性。 One of the major reasons to hinder the development of PKI is the difficulty that certification authorities(CAs )manage certificates.A new solution to solve this problem is proposed base d on the theory of forward -secure digital signature.The scheme utilizes the theory and technology of forward-secure digital signature to guarantee that the loss is the lowest in the case that CA's signing secret key is compromised;it is most efficient when CA has to change its signing secret key;the time information which is included in digital signature can replace time-stamp ,therefore it leaves out the uniform time-stamp server that other PKI systems have to use;it provides the validity of certification path validation.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第19期149-151,163,共4页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:60273089) 陕西省教育厅自然科学研究计划资助项目(编号:00JK266)
关键词 PKI 交叉认证 公钥证书 前向安全 数字签名 PKI ,Cross authentication,Public Key Certificate,Forward-secure,Digital signature
  • 相关文献

参考文献12

  • 1R Housley,W Ford,W Polk et al.Internet X.509 Public Key Infrastructure :Certificate and CRL Profile[S].RFC1259,1999-01.
  • 2A Shamir.How to share a secret[J].Communications of the A CM, 1979; 22:612-613.
  • 3Y Desmedt,Y Frankel.Threshold cryptosystems[C].In:G Brassard ed. Advances in Cryptology-Crypto 89,Lecture Notes in Compute Science, Spring-Verlag, 1989 ; 435.
  • 4Ross Anderson.Invited lecture[C].In:Fourth Annum Conference on Computer and Communications Security,ACM, 1997.
  • 5Mihir Bellare,Sara K Miner.A forward--secure digital signature scheme[C]. In:Advances in Cryptology-CRYPTO'99,Lecture Notes in Compute Science, Spring-Verlag, 1999 ; 1666: 431-448.
  • 6Shafi Goldwasser,Silvio Micali,Ronald L Rivest.A digital signature scheme secure against adaptive chosen-message attaeks[J].SIAM Journal on Computing,1988;17(2):281~308.
  • 7Amos Fiat,Adi Shamir.How. to prove yourself:Practical solutions to identification and signature problems[C].In:Burton S Kaliski Jr ed. Advances in Cryptology-CRYPTO'86,Lecture Notes in Computer Science, Springer-Verlag, 1987 ;263 : 186-194.
  • 8Hugo Krawczyk.Simple forward-secure signatures from any signature scheme[C].In:Seventh ACM Conference on Computer and Communication Security ,ACM ,2000-11.
  • 9Tal Malkin,Daniele Micciancio,Sara Miner.Effcient generic forward-secure signatures with an unbounded number of time periods[C].In:Advances in Cryptology,Proceedings of EUROCRYPT 2002 ,Lecture Notes in Computer Science,Springer-Verlag, 2002; 2332:400-417.
  • 10Poinctcheval D,Stern J.Security proof for signature schemes[C].In: Advances in Cryptology-EUROCRYPTO'96,Lecture Notes in Compute Science, Spring-Verlag, 1996; 1070 : 387-398.

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部