期刊文献+

基于无证书公钥密码的铁路通信网访问控制方案研究 被引量:4

Access control scheme of railway communication network based on certificateless public key cryptography
在线阅读 下载PDF
导出
摘要 基于无证书公钥密码技术的铁路通信网访问控制,能够在显著降低系统开销、快速响应网络访问控制的同时,解决加密访问控制信息的公钥的真实性无法保证的问题。研究过程中使用了无证书公钥密码(CL-PKC,Certificateless Public Key Cryptography)技术和基于角色访问控制(RBAC,Role-Based Access Control),保证系统不被非法操作,相较于使用证书的密码技术,减少系统确认信息真实性的时间。此研究使得铁路通信网的访问控制实现了信息真实性和效率的充分兼顾,能够简单、高效地实现对铁路通信网内信息的保护,满足应用要求。 Access control of railway communication network based on certificateless public key cryptography can greatly reduce system overhead and respond to network access control quickly,and solve the problem that the authenticity of the public key for encrypting access control information cannot be guaranteed.In the process of research,this article used Certificateless Public Key Cryptography(CL-PKC)and Role-Based Access Control(RBAC)to ensure that the system would not be operated illegally.Compared with the use of certificate based cryptography,it reduced the time for the system to confirm the authenticity of information.This research makes the access control of railway communication network implement the full consideration of information authenticity and efficiency,and can realize the protection of information in railway communication network simply and efficiently,and meet the application requirements.
作者 尹虹 田涛 YIN Hong;TIAN Tao(Institute of Computing Technologies,China Academy of Railway Sciences Corporation Limited,Beijing 100081,China;General Office,China Railway,Beijing 100844,China)
出处 《铁路计算机应用》 2020年第8期48-51,共4页 Railway Computer Application
基金 中国国家铁路集团有限公司科研开发计划重大课题(K2019W001)。
关键词 铁路通信网 访问控制 无证书公钥密码 railway communication network access control certificateless public key cryptography
  • 相关文献

参考文献3

二级参考文献11

  • 1肖道举,肖迎霜,陈晓苏.RBAC在EAI中的应用研究[J].计算机工程与科学,2004,26(5):15-17. 被引量:6
  • 2Sattam S.Al-Riyami,Kenneth G.Paterson.Certificateless Public Key Cryptography[C].Proc of Advances in Cryptology,Califomia,USA:Springer-Verlag,2003:452-473.
  • 3BONEH D,FRANKLIN M.Identity-based Encryption from the Weil paring[C].Proc of Advances in Cryptology.New York,USA:Springer-Verlag,2001:213-229.
  • 4Cocks C.An Identity Based Encryption Scheme Based on Quadratic Residues[C].Proc of International Conference on Cryptography and Coding-Proceedings of IMA,Cirencester,UK:Springer-Verlag,2001:360-363.
  • 5Horwitz J,Lynn B.Toward Hierarchical Identity-Based Encryption[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2002:466-481.
  • 6Sakai R.Kasahara M.ID Based Cryptosystems with Pairing on Elliptic Curve[R].Cryptology ePrint Archive,Report 2003/054.
  • 7Sahai A,Waters B.Fuzzy Identity-Based Encryption[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2005:457-473.
  • 8Boneh D,Boyen X.Efficient Selective-ID Secure IdentityBased Encryption without Random Oracles[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2004:223-238.
  • 9Waters BR.Efficient Identity-Based Encryption without Random Oracles[C].Proc of Advances in Cryptology,California,USA:Springer-Verlag,2005:114-127.
  • 10Ravi S.Sandhu,et al.Role-Based Access Control Models[J].IEEE Computer 29 (2):38-47,IEEE Press,1996.

共引文献10

同被引文献29

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部