浏览全部资源
扫码关注微信
[ "庞松涛(1972-),男,浪潮集团副总裁,中国电机工程学会电力信息化专委会委员。历任卡西欧浪潮电子有限公司通信事业部副部长,山东浪潮商用系统有限公司市场部部长,浪潮电子信息产业股份有限公司西南大区总经理、西北大区总经理,浪潮电子信息产业股份有限公司市场推进部总经理、渠道发展部总经理、市场管理部总经理等职。主要从事云计算、服务器及行业管理工作。" ]
网络出版日期:2016-02,
纸质出版日期:2016-02-15
移动端阅览
庞松涛. 基于公钥密码体制的网络认证技术[J]. 电信科学, 2016,32(2):170-174.
Songtao PANG. Network authentication technology based on public key system[J]. Telecommunication science, 2016, 32(2): 170-174.
庞松涛. 基于公钥密码体制的网络认证技术[J]. 电信科学, 2016,32(2):170-174. DOI: 10.3969/j.issn.1000-0801.2016.02.025.
Songtao PANG. Network authentication technology based on public key system[J]. Telecommunication science, 2016, 32(2): 170-174. DOI: 10.3969/j.issn.1000-0801.2016.02.025.
网络认证技术是“互联网+”行动计划应用推广的关键安全保障,基于公钥密码体制的数字签名已经成为身份与信息认证的主要手段,而数字签名有赖于认证中心(CA)及其基础设施(PKI)。目前,认证中心依然存在身份认证不能互信互认、投入高、安全控制及运维难度大等问题。提出一种在不降低安全程度的情况下,缩短公钥密码长度,实现公钥可视化的技术,这种技术可以不再完全依赖第三方的认证机构,是去除认证中心当前存在问题的一种有效途径。
Network authentication technology is the key to the application of internet plus security. The digital signature which depends on the certificate authority (CA)and PKI based on public key system is the main method for identity and message authentication. However,over the years,there are still many problems for the development of CA. The digital signature is not mutual trust and mutual recognition over the application granted by different CA. Moreover,it costs a lot to construct and maintain CA. In order to solve the above problems,one of ways for the improvement is to shorten the length of public key under the condition of not reducing the degree of security. In this way,the public key can be widely recognized under the regulations instead of the third party certification. The application of this public key technology will be an effective way to remove the existing problems of the CA.
吕金刚 , 王永杰 , 鲜明 . 计算机网络信息安全技术分析 [J ] . 中国新通信 , 2006 ( 15 ): 21 - 25 .
LV J G , WANG Y J , XIAN M , . Analyzing on techniques of computer network information security [J ] . China New Telecommunications , 2006 ( 15 ): 21 - 25 .
ATREYA M . 数字签名 [M ] . 北京 : 清华大学出版社 , 2003 : 161 - 170 .
ATREYA M . Digital Signature [M ] . Beijing : Tsinghua University Press , 2003 : 161 - 170 .
肖凌 , 李之棠 . 公开密钥基础设施(PKI)结构 [J ] . 计算机工程与应用 , 2002 ( 10 ): 137 - 139 .
XIAO L , LI Z T . Architecture of PKI [J ] . Computer Engineering&Applications , 2002 ( 10 ): 137 - 139 .
关振胜 . 公钥基础设施PKI及其应用 [M ] . 北京 : 电子工业出版社 , 2008 : 216 - 229 .
GUAN Z S . Publication Key Infrastructure PKI and the Applications [M ] . Beijing : Publishing House of Electronics Industry , 2008 : 216 - 229 .
张锐 , 莫平 . PKI/CA技术在电子政务安全体系建设中的应用研究 [J ] . 中国信息安全 , 2014 ( 7 ): 30 - 32 .
ZHANG R , MO P . Application research of PKI/CA technology in e-government security system construction [J ] . Computer Security , 2014 ( 7 ): 30 - 32 .
赵可 . PKI/CA技术在电子政务信息安全领域的运用探索 [J ] . 科技传播 , 2014 ( 4 ): 116 - 123 .
ZHAO K . Application exploration of PKI/CA technology in the field of e-government information security [J ] . Public Communication of Science & Technology , 2014 ( 4 ): 116 - 123 .
卢开澄 . 计算机密码学 [M ] . 北京 : 清华大学出版社 , 2003 : 216 - 221 .
LU K C . Cryptography [M ] . Beijing : Tsinghua University Press , 2003 : 216 - 221 .
曾福庚 . 公钥密码学的研究与发展 [J ] . 科技信息 , 2010 ( 18 ): 11 .
ZENG F G . Research and development of public key cryptography [J ] . Science and Technology Information , 2010 ( 18 ): 11 .
WASHINGTON W T L C . 密码学概论 [M ] . 许鹏文 , 邹红霞 , 李勇奇 ,译. 北京 : 人民邮电出版社 , 2004 : 153 - 162 .
WASHINGTON W T L C . Introduction to Cryptography with Coding [M ] . Tra nslated by XU P W , ZOU H X , LI Y Q . Beijing : Posts and Telecom Press , 2004 : 153 - 162 .
BELLARE M , POINTCHEVAL D , ROGAWAY P , et al . Authenticated key exchange secure against dictionary attacks [C ] // International Conference on the Theory and Application of Cryptographic Techniques , May 14 - 18 , 2000 , Bruges,Belgium . Berlin : Springer Berlin Heidelberg , 2000 : 139 - 155 .
SHAMIR A . Identity-based cryptosystems and signature schemes [C ] // CRYPTO 84.Berlin:Springer Berlin Heidelberg , 1985 : 47 - 53 .
BONEH D , FRANKLIN M . Identity based Encryption from the Weil pairing [C ] // The 21st Annual International Cryptology Conference , August 19 - 23 , 2001 , Santa Barbara,California,USA . Berlin : Springer Berlin Heidelberg , 2001 : 213 - 229 .
胡云 . RSA算法研究与实现 [D ] . 北京:北京邮电大学 , 2010 : 168 - 175 .
HU Y . Research and implementation of RSA algorithm [D ] . Beijing:Beijing University of Posts and Telecommunications , 2010 : 168 - 175 .
KMIOKA T , SHIMIZU A . The examination of the security of SAS one-time password authentication [R ] . IEICE Tecknical Report , 2001 : 156 - 161 .
NEUKIRCH J . Algebraic Number Theory [M ] . Berlin:Springer Berlin Heidelberg , 1999 : 267 - 298 .
0
浏览量
553
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构