共查询到18条相似文献,搜索用时 453 毫秒
1.
2.
3.
一种基于身份的多信任域网格认证模型 总被引:16,自引:0,他引:16
分析了现有的网格认证框架中存在的问题,提出了一种基于身份的多信任域网格认证模型.该模型以基于身份的PKI为基础,避免了基于传统PKI的认证框架的诸多缺点.同时,该模型提供了跨信任域的双向实体认证功能.模拟试验表明,该认证模型比基于传统PKI的认证框架更轻量、更高效.而且由于该模型可以在多信任域的环境下工作,故而比W Mao提出的只能在单一信任域中工作的认证框架更符合网格认证的实际需要. 相似文献
4.
贾轶;包俊岭;吕永刚;张家华;欧阳震诤 《电子技术与软件工程》2021,(21):239-242
本文基于跨网域的核心技术,打通了公安网、政务网、互联网在身份核验、电子印章等方面的交互壁垒,在物理隔离的网络间实现了数据安全传输和可信身份的跨网域认证,构建了网络可信身份服务体系,提升了\"互联网+政务服务\"能力,不断拓展应用向社会提供可信身份认证服务,助推全社会的\"互联网+政务服务\"应用发展。 相似文献
5.
6.
生物特征的应用集中在两个方面,一是传统的身份认证和识别技术,二是密钥的产生技术。该文研究了从虹膜信息中提取特征码,采用模糊方法从虹膜特征码中提取随机串并将其嵌入到椭圆曲线中等问题。以虹膜信息为基础产生公钥,提出了一种基于虹膜信息的身份签名方案。该方案引进两个密钥生成系统,可有效防止单个密钥生成系统随意伪造签名的缺陷,进一步提高系统的安全性和可靠性。在随机预言机模型下,该方案被证明在适应性选择消息和身份攻击下具有不可伪造安全,并能有效抵抗生日攻击。 相似文献
7.
8.
9.
目前基于身份的认证密钥协商协议均以单个私钥生成器(PKG)为可信第三方,但这种系统结构难以满足身份分层注册与认证需求。该文以基于层级化身份的加密(HIBE)系统为基础重构了私钥的组成元素,并利用椭圆曲线乘法循环群上的双线性映射提出一个基于层级化身份的认证密钥协商协议,为隶属于不同层级的云实体提供了安全的会话密钥协商机制。基于CDH(Computational Diffie-Hellman)与GDH(Gap Diffie-Hellman)假设,该文证明了新协议在eCK模型下具有已知密钥安全性、前向安全性和PKG前向安全性,并且能够抵抗基于密钥泄露的伪装攻击。 相似文献
10.
孙黎博 《电子技术与软件工程》2022,(21):247-250
本文简要陈述多层区块链跨域认证的关键技术,重点分析多层区块链下跨域认证,基于认证模型的构建,依次讨论节点注册、认证身份与事务共识。并结合实际应用场景,对该种跨域认证的运用效果进行评价。 相似文献
11.
A dynamic user authentication scheme allows a user and a remote server to authenticate each other without leaking the user's identity. In 2011, Wen and Li proposed an improved dynamic ID‐based remote user authentication with key agreement scheme for mobile and home networks. They claimed that their scheme was more secure than the scheme of Wang et al. However, we demonstrate that their scheme is vulnerable to the privileged insider, off‐line password guessing, impersonation, and server spoofing attacks. At the same time, it does not provide any user anonymity and forward secrecy property. Thus, it is not feasible for real‐life implementation.Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
12.
13.
14.
In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et al.’s scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice. 相似文献
15.
YANG Geng RONG Chun-ming VEIGNER Christian WANG Jiang-tao CHENG Hong-bing 《中国邮电高校学报(英文版)》2006,13(4):54-60
1 Introduction WSN has received considerable attention during last decade [1?4] (see, for example, the proceedings of the ACM and IEEE Workshops on WSN). It has wide variety of applications, including military sensing and tracking, environment and securit… 相似文献
16.
In cloud computing environments, user authentication is an important security mechanism because it provides the fundamentals of authentication, authorization, and accounting (AAA). In 2009, Wang et al. proposed an identity-based (ID-based) authentication scheme to deal with the user login problem for cloud computing. However, Wang et al.'s scheme is insecure against message alteration and impersonation attacks. Besides, their scheme has large computation costs for cloud users. Therefore, we propose a novel ID-based user authentication scheme to solve the above mentioned problems. The proposed scheme provides anonymity and security for the user who accesses different cloud servers. Compared with the related schemes, the proposed scheme has less computation cost so it is very efficient for cloud computing in practice. 相似文献
17.
In pervasive computing environments (PCEs), privacy and security are two important but contradictory objectives. Users enjoy services provided in PCEs only after their privacy issues being sufficiently addressed. That is, users could not be tracked down for wherever they are and whatever they are doing. However, service providers always want to authenticate the users and make sure they are accessing only authorized services in a legitimate way. In PCEs, such user authentication may include context authentication in addition to the entity authentication. In this paper, we propose a novel privacy enhanced anonymous authentication and access control scheme to secure the interactions between mobile users and services in PCEs with optional context authentication capability. The proposed scheme seamlessly integrates two underlying cryptographic primitives, blind signature and hash chain, into a highly flexible and lightweight authentication and key establishment protocol. It provides explicit mutual authentication and allows multiple current sessions between a user and a service, while allowing the user to anonymously interact with the service. The proposed scheme is also designed to be DoS resilient by requiring the user to prove her legitimacy when initializing a service session.
相似文献
Wenjing LouEmail: |
18.
提出了一个量子身份认证方案,该方案仅在注册时需要认证中心,以后不再依赖于任何第三方.在方案的实施过程中采用一种动态方式,即合法通信者之间每次可动态获得一个新的认证密钥.所提方案具有可证明安全性,安全性由量子不可克隆性和方案本身的动态特性保证. 相似文献