期刊文献+

二方共享与(t,n)门限方案相结合的容侵CA方案 被引量:2

An Intrusion-tolerant CA System Based on Two-party Secret Sharing and (t,n)Threshold Scheme Mechanism
在线阅读 下载PDF
导出
摘要 分析了现有容侵CA方案,提出了一种基于二方共享与(t,n)门限方案相结合的容侵CA方案,即先由CA应用服务器(CAA)、密钥服务器(SS)共享CA私钥,而后进一步将SS的共享密钥SK2利用门限密码的思想分成n份,并由n个密钥共享服务器(SSS)共享。在签名过程中既不需要由d2i(1≤i≤n)重构SK2,也不需要由d2i(1≤i≤n)与SK1重构SK。签名被分为CAA的初次签名与SS的二次签名,在形成正式签名前CAA要与SS相互认证,一旦发现对方签名异常,可即时向仲裁中心报警,从而提高了CA系统的安全性及容侵能力。 After the existing schema is analyzed, a new intrusion-tolerant CA scheme based on a new mechanism, which combines two-party secret sharing arithmetic with (t,n) threshold scheme is proposed. Firstly, CA application sever(CAA) shares secret key of CA with secret sharing server (SS), then the SK2 of SS is further shared among the n secret sharing server(SSS). During the signature, it not only don't need to reconstruct the SK2 by d2i(1≤i≤n) but also to reconstruct the SK by d2i(1≤i≤n) and SK1. The signature is divided into two stage, one is primary signature which is performed in CAA, the other is bis signature which is performed in SS. Before the formation of true signature, CAA and SS would perform mutual authentication, once one of them find the opposing party is in fault, they could give an alarm quickly in this way, the proposed mechanism would improve the security and intrusion-tolerant ability of CA.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第21期138-139,142,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60273084) 武警部队院校军事科研项目
关键词 入侵容忍 CA (T N)门限方案 二方共享 Intrusion-tolerant CA (t,n) threshold scheme Two-party secret sharing
  • 相关文献

参考文献7

  • 1Malkin M, Wu T, Boneh D. Building Intrusion Tolerance Applications[A]. 8^th USENLX Security Symposium[C], 1999.
  • 2Zhou Lidong. Towards Fault-tolerant and Secure On-line Services[EB/ OL][Dissertation]. http://www.cs.comell, edu/ home/ldzhou./thesis.pdf.
  • 3荆继武,冯登国.一种入侵容忍的CA方案[J].软件学报,2002,13(8):1417-1422. 被引量:65
  • 4Wang X. Intrusion-tolerant Password-enabled PKI. In: Proceedings of the 2^nd Annual PKI Research Workshop, Gaithersburg, MD, USA,2003-04:44-53.
  • 5MacKenzie P, Reiter M. Delegation of Cryptographic Servers for Capture-resilient Devices. In: Proceedings of the 8^th ACM Conference on Computer and Communications Security, ACM, 2001:10-19.
  • 6Nicolosi A, Krohn M, Dodis Y, et al. Proactive Two-party Signatures for User Authentication. In: Proceedings of the 10^th Annual Network and Distributed System Security Symposium, 2003:233-248.
  • 7Stinson D R. Cryptography: Theory and Practice. CRC, BocaRaton, 1^st Edtion, 1995.

二级参考文献4

  • 1[1]Gemmell, P.S. An introduction to threshold cryptography. CryptoBytes, 1977,2(7):7~12.
  • 2[2]Wu, T., Malkin, M., Boneh, D. Building intrusion-tolerant applications. In: Proceedings of the USENIX Security Symposium. 1999. 79~91.
  • 3[3]Shoup, V. Practical threshold signatures. In: Proceedings of the Eurocrypt 2000. Bruges (Brugge): Springer-Verlag, 2000. 207~220.
  • 4[4]Frankel, Y., Gemmell, P., MacKenzie, P.D., et al. Optimal-Resilience proactive public-key cryptosystems. In: IEEE Symposium on Foundations of Computer Science. 1997. 384~393.

共引文献64

同被引文献27

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部