期刊文献+

基于椭圆曲线组算法的安全令牌与联合验证 被引量:1

Security Token and Federated Authentication Based on Elliptic Curve Groups Algorithm
下载PDF
导出
摘要 提出、设计完成了一种基于数字椭圆曲线加密算法的安全令牌与数据传输的通用算法.该算法提供的非对称加密和数字签名,能够有效解决非法数据访问,较好解决无状态协议下的数据安全传输问题,为解决云分布环境下无状态协议数据安全访问提供了另类的解决方法,该方法具有较高的效率和安全防范措施,可避免伪造、篡改等不安全因素带来恶意的攻击,对分布式数据的安全访问设计具有一定的参考意义. This paper designed and completed a general algorithm based on elliptic curve encryption algorithm.The algorithm provides asymmetric encryption and digital signature,and it can effectively solve the illegal data access,and it can better solve data security problem under the stateless protocol.It provides an alternative solution to solve the data security access with stateless protocol in cloud distributed environment.This method has high efficiency and safety precautions,it prevents forgery and tamper with the unsafe factors,It has certain reference significance for the designing of the distributed data access.
出处 《微电子学与计算机》 CSCD 北大核心 2014年第11期88-91,共4页 Microelectronics & Computer
基金 河南省教育厅科学技术重点研究项目(14B520040) 河南省科技攻关计划项目(142102210041)
关键词 数字椭圆曲线 安全令牌 联合验证 非对称密钥 数字签名 digital elliptic curve security token federated authentication asymmetric key digital signature
  • 相关文献

参考文献1

二级参考文献10

  • 1Perrig A, Stankovic J, Wagner D. Security in wireless sensor net-works [J]. Communications of the ACM,2004,47(6) :53 —57.
  • 2Bankovic Z,Fraga D,Jos6 M,et al. Detecting and confining sybilattack in wireless sensor networks based on reputation systemscoupled with self-organizing maps[ J]. IFIP Advances in Informa-tion and Communication Technology,2010,339: 311 —318.
  • 3Canh N T,True P T H,Hai T H,et al. Enhanced group-based keymanagement scheme for wireless sensor networks using deploy-ment knowledge [ C] // The 6 th Annual IEEE Consumer Commu-nications and Networking Conference, Las Vegas, Nevada, USA,2009:1 -5.
  • 4Watro R,Kong D,Cuti S,et al. TinyPK: Securing sensor networkswith public technology[ C]Proceedings of the 2nd ACM Work-shop on Security of Ad Hoc Networks and Sensor Networks,Washington DC ,2004:59 —64.
  • 5Perrig A,Szewczyk R,Tygar J D,et al. SPINS:Security protocolsfor sensor networks [ J]. Wireless Networks ,2002,8(5) :521 —534.
  • 6Benenson Z,Gedicke N,Raivio 0. Realizing robust user authenti-cation in sensor networks[ C]Proceedings of Int* 1 Conf on Re-al~World Wireless Sensor Networks, Stockholm ,2005 : 135 —142.
  • 7Eschenauer L,Gligor V D. A key-management scheme for distri-buted sensor networks [ C]//Proceedings of the 9th ACM Confe-rence on Computer and Communications Security, New York,USA,2002: 41 -47.
  • 8Koblitz N. Elliptic curve cryptosystems[ J]. Mathematics of com-putation,1987,48(177) :203 —209.
  • 9Gura N,Patel A,Wander A,et al. Comparing elliptic curve cryp-tography and RSA on 8-bit CPUs[ C\//Proceedings of Int, 1 Confon Cryptography Hardware and Embedded Systems, Cambridge,2004: 925 -943.
  • 10章国安,周超.基于名誉机制的无线传感器网络安全路由协议[J].传感器与微系统,2010,29(10):75-78. 被引量:2

共引文献3

同被引文献3

  • 1陆江勇2013.基于Web网络数据传输安全枝术研究[D].南京:南京理工大学.
  • 2范云海.2013.椭圆曲线密码ECC二进制域的算法改进与硬件实现[D].上海:上海交通大学.
  • 3张云勇,陈清金,潘松柏,魏进武.云计算安全关键技术分析[J].电信科学,2010,26(9):64-69. 被引量:138

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部