期刊文献+

一种新的密钥分配机制 被引量:1

A New Key Distribution Mechanism
在线阅读 下载PDF
导出
摘要 在分析密钥分配机制的基础上 ,提出了一种新的密钥分配机制 ,以实现大容量广域网中端系统的密钥分配。该机制采用三层结构 ,以人工方式通过公钥证书分配公钥 ,利用公钥传送主密钥 ,然后利用主密钥传送会话密钥 ,并对网内通信和网间通信作了不同的处理 。 On the basis of analysis of key distribution mechanism,this paper presents a new key distribution mechanism to implement the key distribution for terminal system in the wide area network.This mechanism consists of three layers,and public keys are manually distributed through public key certification,then the primary keys are used to transfer through the public keys,and the primary keys are used to transfer the session keys,and communication inside and between network also gives different processing to overcome presently some disadvantages of key distribution mechanism.
出处 《电脑开发与应用》 2002年第10期10-11,16,共3页 Computer Development & Applications
基金 本项目为河南省科技攻关项目 (0 0 114 0 164)
关键词 密钥分配机制 计算机通信网络 密码 广域网 端系统 信息加密 key,key distribution,wide area network,terminal system
  • 相关文献

参考文献1

二级参考文献3

  • 1[1]Fred Cohen.Managing Network Security:Simulating Network Security.Network Security,April 1999:6 ~ 11.
  • 2[2]Sierra JM.,Ribagorda A.,Munoz A.Jayaram N.Security protocols in the Internet new framework.Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat.No.99CH36303).IEEE.1999,311-17.Piscataway,NJ,USA.
  • 3[3]Darnell D.PGP or PKI? The future of Internet security.Edi Forum:the Journal of Electronic Commerce,vol.12,no.1,1999,59~ 62.Publisher:EDI Group,USA

共引文献3

同被引文献11

  • 1饶妮妮.一种基于重组DNA技术的密码方案[J].电子学报,2004,32(7):1216-1218. 被引量:10
  • 2李新国,葛建华,赵春明.IBE公钥加密系统的用户私钥分发方案[J].西安电子科技大学学报,2004,31(4):569-573. 被引量:16
  • 3马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 4高加琼,马红春.浅析私钥和公钥加密技术的区别[J].四川职业技术学院学报,2004,14(3):97-99. 被引量:1
  • 5[3]KATZENBEISSER S, PEITTCOLAS F A P. Information Hinding Techniques for Steganography and Digital Watermarking [M]. Boston: ARTECH HOUSE. 2000.
  • 6[4]Maughan D, Scherter M, Schneider M, et al. Internet Security Association and Key Management Protocol(ISAKMP) [DB]. IETF Internet, RFC: 2408,1998,11.
  • 7[6]Anastassiou D. Genomic Signal Processing[J]. IEEE Signal Processing Magazine, 2001,18(4) : 8-20.
  • 8[10]Kiayias A, Yung M. Breaking and Repairing Asymmetric Public-Key Traitor Tracing[C]. ACM Workshop on Digital Rights Managements, Berlin: Springer-Verlag, 2002. 207-224.
  • 9[11]Tzeng W G, Tzeng Z J. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares[C]. PKC 2001. Berlin: Springer-Verlag, 2001. 207-224.
  • 10[12]Watanable Y, Hanaoka G, Iami H. Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents[C]. CT-RSA 2001, Berlin: Springer-Verlag,2001. 392-407.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部