期刊文献+

基于公钥密码体制的网络认证技术 被引量:8

Network authentication technology based on public key system
在线阅读 下载PDF
导出
摘要 网络认证技术是"互联网+"行动计划应用推广的关键安全保障,基于公钥密码体制的数字签名已经成为身份与信息认证的主要手段,而数字签名有赖于认证中心(CA)及其基础设施(PKI)。目前,认证中心依然存在身份认证不能互信互认、投入高、安全控制及运维难度大等问题。提出一种在不降低安全程度的情况下,缩短公钥密码长度,实现公钥可视化的技术,这种技术可以不再完全依赖第三方的认证机构,是去除认证中心当前存在问题的一种有效途径。 Network authentication technology is the key to the application of internet plus security. The digital signature which depends on the certificate authority (CA) and PKI based on public key system is the main method for identity and message authentication. However, over the years, there are still many problems for the development of CA. The digital signature is not mutual trust and mutual recognition over the application granted by different CA. Moreover, it costs a lot to construct and maintain CA. In order to solve the above problems, one of ways for the improvement is to shorten the length of public key under the condition of not reducing the degree of security. In this way, the public key can be widely recognized under the regulations instead of the third party certification. The application of this public key technology will be an effective way to remove the existing problems of the CA.
作者 庞松涛
机构地区 浪潮集团
出处 《电信科学》 北大核心 2016年第2期170-174,共5页 Telecommunications Science
关键词 数字签名 身份认证中心 可视化公钥 digital signature, authentication center, visual public key
作者简介 庞松涛(1972-),男,浪潮集团副总裁,中国电机工程学会电力信息化专委会委员。历任卡西欧浪潮电子有限公司通信事业部副部长,山东浪潮商用系统有限公司市场部部长,浪潮电子信息产业股份有限公司西南大区总经理、西北大区总经理。浪潮电子信息产业股份有限公司市场推进部总经理、渠道发展部总经理、市场管理部总经理等职。主要从事云计算、服务器及行业管理工作。
  • 相关文献

参考文献13

二级参考文献8

  • 1W.Diffie,M.E.Hellman,New directions in cryptography,IEEE Transactions on information The-ory,IT-22(6),1976,644-654.
  • 2R.L.Rivest,A.Shanfir and L.Adleman,A Method for Obtaining Digital Signatures and Public Key Cryptosystem Comm.ACM.21 (1978)120-126.
  • 3S.Goldwasser and S.Micali,Micali,Probabilitic encryption and how to play mental poker.keeping secret all partial information,In STOC'82,ACM,1982,pp.365-377.
  • 4A.Shamir,Identity-based cryptosystems and signature schemes,In Advancesin Cryptology-Crypto'84,LNCS,Berlin,springer-Verlag,1984,pp.47-53.
  • 5C.Rackoff and D.simon,Non-interactive zero-knowledge proof of knowledge and chosen cipher-text attack,In Advances in Cryptology -Crypto'91,LNCS 576,Springer,1991,99.433-444.
  • 6D.Boneh,and M.Franklin,Identity-based Encryption from the Well pairing,SIAM,Journal ofComputing,vol.32(3),2003,586-615.In Advances in Crptology-Cryto'01,LNCS 2139,Berlin,Sprin -ger Verlag,2001,pp.213-229].
  • 7C.Cocks,An Identity Based Encryption Scheme Based on Quadratic Residues,In Proceedings of the IMA conference on Cryptography and Coding 2001,LNCS 2260,SpringVerlag,2001,pp.360 -363.
  • 8汪立东,余祥湛,方滨兴.PKI中几个安全问题的研究[J].计算机工程,2000,26(1):14-16. 被引量:16

共引文献92

同被引文献52

引证文献8

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部