期刊文献+

认证体制综述 被引量:13

The Overview of Authentication Systems
下载PDF
导出
摘要 互联网的开放性和匿名性使得安全问题越来越突出.认证体制是网络安全的第1道大门,它确保网络传输的信息资源只能被合法用户所访问,因此身份认证技术是整个信息安全的基础.身份认证技术已成为网络安全研究的一个重要方面,在介绍公钥基础设施(public key infrastructure,PKI)证书认证体制、基于标识的密码技术(identity-based cryptograph,IBC)标识认证体制的基础上,梳理了它们的功能和不足.面对这些功能和不足,人们发明了基于标识的证书认证体制CFL.初步介绍了CFL的特点. The security problems of internet are more and more serious because of its openness and anonymity. The first step of the network security authentication scheme is certification system. It ensures that the information resources transmitted on network can only be accessed by legitimate users,so that the identity authentication technology is the foundation of the whole information security. It also becomes one important aspect of the network security, this paper summarizes the functions and shortages of PKI certificate authentication system and IBC identity authentication system based on the introduction of them. The characteristics of the CFL are introduced preliminarily.
出处 《信息安全研究》 2016年第7期649-659,共11页 Journal of Information Security Research
关键词 认证体制 身份认证 公钥基础设施 基于标识的密码技术 CFL(Chen Fan and Lü) authentication system identity authentication public key infrastructure (PKI) identity-based cryptograph (IBC) 5 CFL (Chen, Fan, and Lii)
  • 相关文献

参考文献6

二级参考文献18

  • 1于功敬,孟宪军.CORBA防火墙安全技术研究[J].计算机测量与控制,2004,12(12):1155-1158. 被引量:2
  • 2曹天杰.计算机系统安全[M].北京:高等教育出版社,2005.
  • 3Niels Ferguson,Bruce Schneier.Practical Crytography,[M].北京:电子工业出版社,2005.8.131.
  • 4Alfred J.Menezes,应用密码学手册[M].北京:电子工业出版社,2005.6.256-258.
  • 5Jurjen Bos.Practical Privacy.PhD thesis,Eindhoven University of Technology,1992.
  • 6[1]Joux A.A one round protocol for tripartite Diffie-Hellman.In:Algorithmic Number Theory IV-th Symposium(ANTS IV),Computer Science,2000:385-394.
  • 7[2]S Al Riyami,Paterson K.Authenticated three party key agreement Protocols from pairings.Cryptology ePrint Archive,Report 2002/035,available at http://eprint.iacr.org/2002/035/.
  • 8[3]Smart N.An ID-based authenticated key agreement protocol based on the Weil pairing.Elec Lett,2002,38(13):630-632.
  • 9[4]Shim K.Efficient ID-based authenticated key agreement protocol from the Weil pairing.Elect.Lett,2003,39:653-654.
  • 10[5]Sun H,Hsieh B.Security analysis of Shim's authenticated key agreementprotocols from pairings.Cryptogarphy ePrint Archive,Report 2003/113,available at http://eprint.iacr.org/2003/113,2003.

共引文献19

同被引文献74

引证文献13

二级引证文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部