期刊文献+

一种基于隐藏证书的自动信任协商模型 被引量:4

A Hidden Credential Based Automated Trust Negotiation Model
在线阅读 下载PDF
导出
摘要 自动信任协商是一种通过逐步暴露证书和访问控制策略以确立协商双方信任关系的安全方法。隐藏证书采用椭圆曲线加密的原理,具有极好的安全保密性与数据完整性。本文将隐藏证书引入到自动信任协商系统中,提出了一种基于隐藏证书的自动信任协商模型(简称为HCBATN)。该模型使用隐藏证书来携带并传递双方交换的证书、访问控制策略、资源等信息,充分保护了证书、策略的敏感信息以及用户个人隐私;同时具有单轮回证书交换、较小的网络开销、较低的证书保存、较高安全保密性等优点。 Automated Trust Negotiation, for short ATN, is an approach to establishing trust relationship between strangers through iterative disclosure of digital credentials and access control policies. Hidden credential is based on ellipse curve Cryptography and has a high secure level. When hidden credential is introduced to ATN, a hidden credential based ATN model, called HCBATN, is presented in this paper. The model uses hidden credential to carry and transfer participants' digital credentials, access control polices and resource/service, which can greatly protect sensitive credentials and policies as well as user's privacy. Meanwhile, due to hidden credential's inherent characteristic, the model has many features of one-round credential exchange, little network cost, little spending on storing and finding credentials, high secure integrality etc.
出处 《计算机科学》 CSCD 北大核心 2006年第12期59-61,74,共4页 Computer Science
基金 国家自然科学基金重大专项(90412010)资助。
关键词 隐藏证书 自动信任协商 认证 策略 身份加密系统 Hidden credential,Automated trust negotiation, Authentication,Policy,ldentity-based encryption
  • 相关文献

参考文献8

  • 1Winsborough W H,Li Ninghui. Safety in Automated Trust Negotiation. In:Proceedings of the 2004 IEEE Symposium on Security and Privacy,IEEE Press, 2004. 123-135
  • 2Winsborough W H,Li N. Protecting sensitive attributes in automated trust negotiation. In: Proceeding of ACM Workshop on Privacy in the Electronic Soeiety,ACM Press,2002. 102-113
  • 3Winsborough W, Seamons K,Jones V, Automated Trust Negotiation. In:Proceeding of DARPA Information Survivability Conference and Exposition, ACM Press, 2000. 156-182
  • 4Holt J E, Bradshaw R, Seamons K E. et al. Hidden crdentials.In:Proceedings of 2nd ACM Workshop on Privacy in the Electronic Society,ACM Press, 2003. 1-8
  • 5Bradshaw R W, Holt J E, Seamons K E. Concealing Complex Policies with Hidden Credentials. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, ACM Press, 2004. 245-253
  • 6Frikken K, Atallah M, Li Jiangtao. Hidden Access Control Policies with Hidden Credentials. In: Proceedings of the 3rd ACM Workshop on Privacy in the Electronic Society, ACM Press,2004. 130-131
  • 7Boneh D, Franklin M. Identity based encryption from the Weil pairing. InzProceedings of Crypto2001,Advanees in Cryptology,Lecture Notes in Computer Science, Vol 2139, Springer-Verlag,2001. 213-229
  • 8Gura N, Eberle H, Shantz S C. Generic implementations of elliptic curve cryptography using partial reduction. In,Proceedings of the 9th ACM Conference on Computer and Communications ecurity,ACM Press, 2002. 1771-89

同被引文献28

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部