期刊文献+

GSM网络环境上椭圆曲线密码系统身份认证协议的研究 被引量:2

Identity authentication protocol in GSM network environment based on elliptic curve cryptosystem
下载PDF
导出
摘要 提出一种将椭圆曲线密码系统身份认证协议应用GSM网络上进行身份认证的控制方法.采用CA证书机制,应用离线获取证书,在线相互认证提高GSM网络系统安全性.应用无求逆数字签名方案实现CA认证,简化了计算复杂度,并通过通讯双方数字签名实现不可抵赖性,最后给出了协议安全分析.提出的认证协议具有保密性高及传输参数少的优点,较容易在无线移动通讯系统软硬件中实现. Identity authentication in GSM network environment is proposed by using identity authentication protocol based on elliptic curve cryptosysterm. Applying CA mechanism, obtaining the certification offline, the security of the GSM network system is enhunced by authenticating each other online. The CA mechanism is executed by using the no-inverse digital signature scheme, and the complexity of computing is reduced. The mutual signatures of communication realize the nonrepudiation. The security analysis of the protocol is given. The advantages of this protocol are higher security, less parameters of transmission and easier to realize by the hardware of mobile wireless communication system.
出处 《控制与决策》 EI CSCD 北大核心 2004年第4期474-477,480,共5页 Control and Decision
基金 国家自然科学基金资助项目(69874038) 国家高技术研究发展计划资助项目(2001AA115300).
关键词 椭圆曲线加密系统 CA证书 数字签名 身份认证 elliptic curve cryptosystern certification authentication digital signature identity authentication
  • 相关文献

参考文献7

  • 1[1]Lo Chi-Chun, Chen Yu-Jen. A secure communication architecture for GSM networks[A]. Proc IEEE PACRIM′99[C].Victoria,1999.
  • 2[2]Lo Chi-Chun, Chen Yu-Jen. Secure communication mechanisms for GSM networks[J]. IEEE Trans on Consumer Electronics,1999, 45(4):1074-1080.
  • 3[3]Lo Chi-Chun, Chen Yu-Jen. Stream ciphers for GSM networks[J]. Computer Communications,2001,24(11):1090-1096.
  • 4[6]Microprocessor ,Microcomputer Standards Committee of the IEEE Computer Society. IEEE Standard Specifications for Public Key Cryptography[DB/OL]. http://intl. ieeexplore.ieee. org. 2002-01-30.
  • 5[7]Sarbari Guta, Stephen M, Matyas J. Public key infrastructure analysis of existing and needed protocols and object formats for key recovery[J]. Computers and Security,2000,19:56268.
  • 6[8]Park C-S. On certificate-based security protocols for wireless mobile communication systems[A]. IEEE Network[C].1997.50-55.
  • 7[9]Beller M J, Chang L-F, Yacobi J. Privacy and authentication on a portable communications systems[J]. IEEE J on Selected Areas in Communications,1993,11(6):821-829.

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部