期刊文献+

一种基于自证明公钥的P2PSIP可认证密钥协商方案

P2PSIP Authenticated Key Agreement Scheme Based on Self-certified Public Key
下载PDF
导出
摘要 在使用P2P网络代替SIP服务器实现SIP功能的系统中,如何有效认证无可信中心的网络中,用户身份及用户间的密钥交换的问题必须得到解决以提供安全通信。本文分析了P2PSIP结构中的安全威胁,针对基于SIP的P2P通信提出了一种基于自证明公钥的可认证密钥协商方案,并分析了该方案的正确性和安全性。 In the system accomplishing the functions of SIP by applying P2 P network in place of SIP server,the problems of how to certify the user identity and how to exchange secret key between users in a network without trusted center must be solved in order to provide secure communication. The security threats in P2 PSIP structure are analyzed and a key agreement scheme based on self- certified public key for P2 P communication is proposed. The analysis of the correctness and security of the scheme is also discussed.
出处 《北京电子科技学院学报》 2014年第2期1-5,共5页 Journal of Beijing Electronic Science And Technology Institute
基金 2012年国家科技支撑计划支持
关键词 P2PSIP 自证明公钥算法 双向身份认证 密钥协商 PeertoPeer SIP Self-certified public key algorithm mutual authentication key agreement
  • 相关文献

参考文献3

二级参考文献21

  • 1刘华,王琨.基于PKI的SIP协议安全的研究[J].电子科技,2005,18(2):37-40. 被引量:13
  • 2D.Bryan,P.Matthews and E.Shim,et.Concepts and Terminology for Peer to Peer SIP,IETF:draft-ietf-p2psip,July 2008.http://tools.ietf.org/id/draft-ietf-p2psip-concepts-02.txt
  • 3D.Bryan,BB.Lowekamp and Cullen Jennings,SOSIMPLE:A Serverless,Standards-based,P2P SIP Communication System [C], AAA-IDEA 2005. IEEE Press, 2005, pp:42 - 49
  • 4Ingmar Baumgart, P2PNS: A Secure Distributed Name Service for P2PSIP [ C ], 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications, 2008. IEEE Press, 2008, pp:480 -485
  • 5M.Matuszewski,P.Laitinen,Security requirements in P2PSIP,IETF:draft-matuszewski-p2psip,November,2007.http://tools.ietf.org/id/draft-matuszewski-p2psip-security-requirements-02.txt
  • 6John R. Douceur, The Sybil Attack [ C ], Peer- to -peer Systems: First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7 - 8, 2002. Springer,2002, pp: 251 - 260.
  • 7Kundan Singh,Henning Schulzrinne.Peer-to-Peer Internet Telephony using SIP.Columbia University Technical Report CUCS-044-04,October,2004,http://www1.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-044-04.pdf
  • 8Seedorf. J. Using Cryptographically Generated SIP - URIs to protect the Integrity of Content in P2P - SIP[ EB/OL]. Third Annual VolP Security Workshop, Berlin, Germany, June 2006, http://www, informatik, uni- hamburg, de/SVS/papers/Using cryptographically generated SIP - URIs. pdf
  • 9Junzuo Lai and Weidong Kou. Self- Generated -Certificate Public Key Encryption Without Pairing [ C ].PKC 2007, Beijing, China, April 16 - 20, 2007. Germany: Springer - Verlag, 2007, LNCS 4450, pp. 476 -489.
  • 10Xu An Wang , Xiaoyuan Yang and Yiliang Han. Cryptanalysis of Self - Generated - Certificate Public KeyEncryption without Pairing in PKC07 [ EB/OL], Cryptology ePrint Archive: Report 2008/191, 2008. http://eprint, iacr. org/2008/191

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部