期刊文献+

普适环境下的一种跨域认证机制 被引量:1

Inter-domain authentication scheme for Pervasive Computing Environments
在线阅读 下载PDF
导出
摘要 由于普适计算的高度移动性,通信的双方经常位于不同的区域,为了保证服务的合法访问以及消息的安全传输,需要进行跨域认证以及安全会话密钥建立。提出了一种新的跨域认证与密钥建立协议,该协议采用生物加密技术省去了证书管理的负担,合理设计了通信双方及其各自服务器之间的交互,完成了跨域双向认证,并采用签密技术为通信双方派生密钥。对协议进行了安全及性能的分析,并用经典的SVO逻辑证明了其正确性。 As a result of the high mobility of the pervasive computing,the principles communicating with each other usually locate at different domains.To secure the service access and communications, the principles should authenticate each other and establish a fresh session key.A novel inter-domain authentication and key establishment protocol is proposed.The pro- posed protocol reduces the burden of certificates management by adopting the biometric encryption.Afler inter-domain mutual authentication,the two principles build a new session key using the signcryption technique.The protocol can defend lots of attacks and its correctness is proven by the SVO logic.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第6期82-85,共4页 Computer Engineering and Applications
关键词 跨域认证 密钥建立 生物加密 签密 普适计算环境 inter-domain authentication key establishment biometric encryption signcryption Pervasive Computing Environments(PCE)
  • 相关文献

参考文献7

  • 1Mark W.The computer for the 21st century[J].Scientific Ameri- can, 1991,265(3) :66-75.
  • 2Tuladhar S R, Caicedo C E,Joshi J B D.Inter-domain authenti- cation for seamless roaming in heterogeneous wireless network[C]// IEEE International Conference on Sensor Networks,Ubiquitous, and Trustworthy Computing, Taichung, Taiwan, 2008.
  • 3Ford L W,Lim H.Identity-based and inter-domain password authenticated key exchange for lightweight clients[C]//21st Interna- tional Conference on Advanced Information Networking and Ap- plications Workshops.Washington, DC, USA: IEEE Computer Society, 2007 : 544-550.
  • 4Hwang Ren-Junn, Su Feng-Fu.A new efficient authentication pro- tocol for mobile networks[J].Computer Standards & Interfaces, 2005,28: 241-252.
  • 5Syverson P F,van Oorschot P C.On unifying some cryptographic protocol logics[C]//Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy.Los Alamitos:IEEE Computer Society Press,1994:14-28.
  • 6冯全,苏菲,蔡安妮.生物加密综述[J].计算机工程,2008,34(10):141-143. 被引量:10
  • 7Zheng Yuliang, Imai H.Compact and tmforgeable key establish- ment over an ATM network[C]//Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco,CA,USA, 1998:411-418.

二级参考文献18

  • 1Uludag U,Pankanti S,Prabhakar S,et al.Biometric Cryptosystems:Issues and Challenges[C]//Proc.of IEEE Conference on Multimedia Information Retrieval.[S.l.]:IEEE Press,2004.
  • 2Nichols P K.ICSA Guide to Cryptography[M].[S.l.]:McGraw-Hill Companies,1998.
  • 3Adler A.Vulnerabilities in Biometric Encryption Systems[C]//Proc.of Audio-and Video-based Biometric Person Authentication 2005.New York,USA:[s.n.],2005.
  • 4Davida G I,Frankel Y Matt B J.On Enabling Secure Applications Through Off-line Biometric Identification[C]//Proc.of 1998 IEEE Symp.on Security and Privacy.Oakland,California,USA:[s.n.],1998.
  • 5Juels A,Wattenberg M.A Fuzzy Commitment Scheme[C]//Proc.of the 6th ACM Conference on Computer and Communications Secufity.Singapore:[s.n.],1999.
  • 6Feng Hao,Anderson R,Daugman J.Combining Crypto with Biometrics Effectively[J].IEEE Transactions on Computers,2006,55(9):1081-1088.
  • 7Juels A,Sudan M.A Fuzzy Vault Scheme[C]//Proc.of IEEE International Symp.on Information Theory.Lausanne,Switzerland:[s.n.],2002.
  • 8Uludag U,Pankanti S.Jain A.Fuzzy Vault for Fingerprints[C]//Proc.of Audio-and Video-based Biometric Person Authentication 2005.New York,USA:[s.n.],2005.
  • 9Walter J S,Terrance E B.Cracking Fuzzy Vaults and Biometric Encryption[EB/OL].(2007-06-20).vast.uccs.edu/~tboult/PAPERS/Scheirer-Boult-BCC07-Crack-Fuzzy-Vault.pdf.
  • 10Dodis Y,Reyzin L,Smith A.Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data[C]//Proc.of Euroerypt 2004 International Conference on the Theory and Applications of Cryptographic Techniques.Interlaken,Switzerland:[s.n.],2004.

共引文献9

同被引文献10

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部