高级检索
    田 野, 张玉军, 李忠诚. 使用对技术的基于身份密码学研究综述[J]. 计算机研究与发展, 2006, 43(10): 1810-1819.
    引用本文: 田 野, 张玉军, 李忠诚. 使用对技术的基于身份密码学研究综述[J]. 计算机研究与发展, 2006, 43(10): 1810-1819.
    Tian Ye, Zhang Yujun, Li Zhongcheng. A Survey of Identity-Based Cryptography Using Pairing[J]. Journal of Computer Research and Development, 2006, 43(10): 1810-1819.
    Citation: Tian Ye, Zhang Yujun, Li Zhongcheng. A Survey of Identity-Based Cryptography Using Pairing[J]. Journal of Computer Research and Development, 2006, 43(10): 1810-1819.

    使用对技术的基于身份密码学研究综述

    A Survey of Identity-Based Cryptography Using Pairing

    • 摘要: 密钥管理是基于证书密码学中最复杂的问题,基于身份密码学正是为了简化密钥管理问题提出的.从保障信息安全的3个基本密码学要素(加密、数字签名和密钥协商)出发,对基于身份密码学的研究现状进行了综述,对其中存在的安全模型、执行效率等问题进行了详细分析.由于针对基于身份密码学缺乏实际应用研究,以解决无线移动IPv6网络环境下的接入控制和数据机密性问题为应用场景,讨论了一种基于身份密码技术的应用思路和问题,同时基于身份密码技术本身及其应用两方面指出了未来的研究趋势.

       

      Abstract: Identity-based cryptography is proposed to simplify key management which is one of the most complex problems in certificate-based cryptography. Firstly, the identity-based cryptography technologies are surveyed from three fundamental primitives (encryption, digital signature, and key agreement), and some problems in these technologies are analyzed, including security models, efficiency, and so on. Because of the lack of study for applications, how to apply identity-based cryptography to implement access authentication and data confidentiality in wireless mobile IPv6 network is discussed. Finally, the possible new directions of identity-based cryptography techniques and the applications are pointed out.

       

    /

    返回文章
    返回