网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (6): 32-37.doi: 10.11959/j.issn.2096-109x.2016.00047

• 学术论文 • 上一篇    下一篇

基于身份标识加密的身份认证方案

黄仁季(),吴晓平,李洪成   

  1. 海军工程大学信息安全系,湖北 武汉 430033
  • 修回日期:2016-05-06 出版日期:2016-06-15 发布日期:2020-03-26
  • 作者简介:黄仁季(1994-),男,山东青岛人,海军工程大学硕士生,主要研究方向为信息网络安全。|吴晓平(1961-),男,山西新绛人,博士,海军工程大学教授、博士生导师,主要研究方向为信息安全、密码学。|李洪成(1991-),男,河南商丘人,海军工程大学博士生,主要研究方向为信息安全、数据挖掘。
  • 基金资助:
    国家自然科学基金资助项目(61100042);湖北省自然科学基金资助项目(2015CFC867);国家社会科学基金军事学资助项目(15GJ003-201)

Identity authentication scheme based on identity-based encryption

Ren-ji HUANG(),Xiao-ping WU,Hong-cheng LI   

  1. Department of Information Security,Naval University of Engineering,Wuhan 430033,China
  • Revised:2016-05-06 Online:2016-06-15 Published:2020-03-26
  • Supported by:
    The National Natural Science Foundation of China(61100042);The Natural Science Foundation of Hubei Province(2015CFC867);The National Social Science Found Project in Military Science(15GJ003-201)

摘要:

在大规模通信节点的网络中,网络节点数量大、设备种类多,传统的PKI密码体系存在证书管理困难与资源浪费的问题。设计了基于身份标识加密的节点双向认证方案。利用基于身份的密码加密对通信节点进行双向的身份认证,解决了PKI体系中的数字证书管理问题;采用密钥分割的方法解决了基于身份密码体制所存在的密钥托管问题。同时,在认证协议中引入随机因子、时间戳、散列运算等防范各种网络攻击。最后,对加密算法的安全性和效率以及认证协议的安全性进行了分析,证明了认证方案是安全可靠的。

关键词: 节点身份认证, 基于身份的密码体制, 密钥托管, 加密

Abstract:

In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme.

Key words: node identity authentication, identity based cryptograph, key escrow, encryption

中图分类号: 

No Suggested Reading articles found!