期刊文献+

浅谈基于CPK的可信认证 被引量:1

On Trusted Authentication Based on CPK
下载PDF
导出
摘要 文章讨论了认证的相关技术,介绍了CPK(Combination of Public Key,组合公钥)原理,分析了CPK标识认证算法应用于可信计算、可信连接和可信交易这3个可信世界中需要提供可信认证的主要环节的技术优势。分析表明,CPK在提供高可信基础的同时,也提供高效安全的可信控制和服务。 This paper discusses the technology related to authentication and the theoly of CPK ( Com- bination of Public Key). The advantages of trusted computing, trusted connecting and trusted transaction based on CPK are analyzed. The results prove that CPK could not only provide the basis of high trust for them, but also safely and efficiently provide trusted controls and services.
出处 《信息工程大学学报》 2009年第3期309-312,共4页 Journal of Information Engineering University
基金 国家重点基础研究发展计划资助项目(2007CB311100)
关键词 可信计算 可信连接 可信交易 CPK trusted computing trusted connecting trusted transaction CPK
  • 相关文献

参考文献11

  • 1南相浩.CPK算法与标识认证[J].信息安全与通信保密,2006,28(9):12-16. 被引量:30
  • 2南湘浩,陈钟编著..网络安全技术概论[M].北京:国防工业出版社,2003:357页.
  • 3Trusted Computing Group. TCG Specification Architecture Overview[ EB/OLI. [ 2008 - 08 - 01 ]. https://www. trustedcomputinggroup, org. 被引量:1
  • 4Trusted Computing Group. TPM Main Specification version 1.2[EB/OL]. [2008 -08 -01]. https://www. trustedcomputinggroup, org. 被引量:1
  • 5George P. User authentication with smart cards in trusted computing architecture [ C ]//Proceedings of the International Conference on Security and Management. 2004:25 -31. 被引量:1
  • 6Hardjono T. TCG trusted network connect, TNC architecture for interoperability specification version 1.3. [ EB/ OL]. [2008 - 04 - 28]. Trusted Computing Group. https ://www. trustcdcomputing group, org. 被引量:1
  • 7Brickell E, Cameniscb J, Chen Liqun. Direct anonymous attestation. Trusted Computing Group[ EB/OL]. [ 2008 - 05 - 01 ]. http://www. trustedcomputinggroup, org/ February 11,2004. 被引量:1
  • 8Ben Smyth, Mark Ryan, Liqun Chen. Direct Anonymous Attestation (DAA): Ensuring privacy with corrupt administrators [ C ]//Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. Lecture Notes in Computer Science (LNCS). 2007:218 -231. 被引量:1
  • 9Carsten Rudolph. Covert Identity Information in Direct Anonymous Attestation ( DAA ) [ C ]//Proceedings of the 22nd IFIP TC - 11 International Information Secuity Con- ference ( LNCS). 2007:443 - 448. 被引量:1
  • 10Adrian Leung, Liqun Chen, Chris J. Mitchell. On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA)[EB/OL]. [2007 - 12 -23]. http://www. rhul. ac. uk/mathematics/techreports. 被引量:1

共引文献29

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部