期刊文献+

基于魔方算法的自动信任协商敏感信息传输方案 被引量:3

Sensitive information transmission scheme based on magic cube algorithm in automated trust negotiation
下载PDF
导出
摘要 为解决自动信任协商(ATN)过程中在不安全物理信道上传输证书及其他资源的问题,提出一个基于魔方算法的敏感信息传输方案。协商发起方根据魔方算法把自己的请求或资源变换成一个变换序列,并在其后添加数字摘要产生信息变换序列。然后按表示协商成功条件的证书逻辑表达式把信息变换序列乱序成信息传输序列,再发送给协商接收方;协商接收方用自己的证书进行反向变换后得到请求或资源。该方案具有单轮证书交换、较小的网络开销等特性。实验结果表明,该方案具有较好的可行性,较高的安全性、效率与信息传输量。 To solve the problem of transmitting credentials and other resources through unsafe physical channels during an Automated Trust Negotiation(ATN),a transmission scheme for credentials and resources was proposed based on magic cube algorithm.Through the magic cube algorithm,a transformation sequence was formed in terms of the request or the resource of negotiation initiator,followed by the digital digest to generate the information transformation sequence.According to the logical expression composed of credentials which represent the condition negotiation success,the information transformation sequence was shuffled to form an information transmission sequence,which was sent to the negotiation receiver.The information transmission sequence was reciprocally transformed by the negotiation receiver according to his own credentials.This scheme has many features of the one-round credential exchange,and little network cost.The example shows that the scheme is feasible,and the experimental results show that the scheme has good security and efficiency and low information transmission capacity.
出处 《计算机应用》 CSCD 北大核心 2011年第4期984-988,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61073042)
关键词 魔方算法 自动信任协商 信息变换序列 信息传输序列 数字摘要 证书标志 magic cube algorithm Automated Trust Negotiation(ATN) information transformation sequence information transmission sequence digital digest credential flag
  • 相关文献

参考文献12

  • 1廖振松,金海,李赤松,邹德清.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948. 被引量:52
  • 2李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 3LI JIANGTAO, Ll NINGHUI. OACerts: Oblivious attribute certifi-cates[ C ]// Proceedings of the Third Conference on Applied Cryp-tograpby and Network Security. New York: ACM, 2003. 108 121.
  • 4YU T, WINSLETI' M. A unified scheme for resource protection in automated trust negotiation [ C ]// Proceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2003:245-257.
  • 5SEAMONS K E, WINSLE3TF M, YU T. Limiting the dis61osure of access control policies during automated trust negotiation[ C ]//Network and Distributed System Security Symposium. California: IEEE Computer Society, 2001:212-231.
  • 6WINSBOROUGH W H, LI N H. Towards practical automated trust negotiation[C ]// Proceedings of the Third International Workshop on Policies for Distributed System and Networks. Washington, DC: IEEE Computer Society, 2002:92 - 103.
  • 7HOLT J E, BRADSHAW R W, SEAMONS K E, et al. Hidden credentials[ C ]//2nd ACM Workshop on Privacy in the Electronic Society. New York: ACM, 2003:1-8.
  • 8王继林,陈晓峰,陈德人.无安全信道的OSBE方案[J].浙江大学学报(工学版),2006,40(4):590-593. 被引量:2
  • 9BONEH D, FRANKLIN M. Identity based encryption from the Weil pairing, extended abstract[ C ] // Proceedings of Crypto 2001, LNCS 2139. Berlin: Springer-Verlag, 2001:213-229.
  • 10陈涛,谢阳群.基于扩展的N维魔方加密算法的设计与实现[J].情报杂志,2005,24(2):13-14. 被引量:6

二级参考文献21

  • 1史伊龙,施小成,赵淑琴.主动数据库技术在控制系统规则库方面的应用研究[J].微计算机信息,2004,20(8):27-28. 被引量:8
  • 2周秋剑,贾永杰,李刚.一种新的口令认证方案[J].空军雷达学院学报,2003,17(2):36-38. 被引量:4
  • 3徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 4黄其民.即时消息交换系统模型研究与实现[J].微计算机信息,2006,22(10X):105-107. 被引量:3
  • 5Dreamtech软件开发组.即时消息传递系统编程源代码分析[M].北京:电子工业出版社,2002.5-7.
  • 6William Stallings著 刘玉珍 王丽娜 傅建明等译.密码编码学与网络安全--原理与实践(第三版)[M].,2004..
  • 7卢开澄.计算机密码学[M].北京:清华大学出版社,2002..
  • 8SEAMONS K E,WINSLETT M,YU T.Limiting the disclosure of access control policies during automated trust negotiation[C]∥Proceedings of the Symposium on Network and Distributed System Security.San Diego,California,USA:IEEE Computer Society Press,2001:109-124.
  • 9WINSBOROUGH W H,LI N.Towards practical automated trust negotiation[C]∥Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks.Monterey,California,USA:IEEE Computer Society Press,2002:92-103.
  • 10LI N,DU W,BONEH D.Oblivious signature-based envelope[J].Journal of Distributed Computing,2005,17(4):293-302.

共引文献97

同被引文献28

  • 1马虹博,刘连浩.基于混沌的魔方置乱算法设计[J].计算机工程与应用,2006,42(12):138-140. 被引量:4
  • 2洪帆,郭亚军.资源限制信任协商[J].华中科技大学学报(自然科学版),2006,34(5):23-25. 被引量:7
  • 3廖振松,金海,李赤松,邹德清.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948. 被引量:52
  • 4Winslett M, Yu T, Seamons K, et aL Trnst negotiatian on the Web. IEEE lnteruet Computing, 2002, 6(6):30-37.
  • 5Yu T, Winslett M, Seamons K E. Supporting structured credentiMs and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security, 2003, 6 (1):1-42.
  • 6Guo S X, Jiang W B. A trust evaluation model and algorithm. Pnw, eedings of International Conference on Communications and Intelligence Information Security, Nanning. c t-ina. 2010:130-134.
  • 7Horst T, Sundelin T, Seamons K E, et -d. Mobile trust negotiation authentication and authorization in dynamic mobile networks. Pruceedings of Eighth IFIP Conference Communications and Multimedia Security, Porto, Portugal, 2004.
  • 8WINSBOROUGH W H, SEAMONS K E, JONES V E. Automated trust negotiation [C]// DISCEX'00: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition. Piscataway: IEEE, 2000: 88-102.
  • 9YU T, WINSLETT M. A unified scheme for resource protection in automated trust negotiation [C]// Proceedings of the 2003 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2003: 110-122.
  • 10SEAMONS K E, WINSLETT M, YU T. Limiting the disclosure of access control policies during automated trust negotiation [C]// Proceedings of the 2001 Network and Distributed System Security Symposium. Berkeley: USENIX Association, 2001: 25-32.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部