检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:ZHANG JunWei MA JianFeng MOON SangJae
机构地区:[1]Key Laboratory of Computer Networks and Information Security (Ministry of Education), Xidian University, Xi'an 710071, China [2]Mobile Network Security Technology Research Center, Kyungpook National University, Daegu 702-701, Korea
出 处:《Science China(Information Sciences)》2010年第3期465-482,共18页中国科学(信息科学)(英文版)
基 金:supported by the National High-Tech Research & Development Program of China (Grant Nos.2007AA01Z429, 2007AA01Z405);the Major Program of the National Natural Science Foundation of China (GrantNo. 60633020);the National Natural Science Foundation of China (Grant Nos. 60573036, 60702059,60503012,60872041);the Korea Research Foundation Grant funded by the Korean Government (Grant No. KRF-2008-521-D00449)
摘 要:This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality FTNC, the EAP ideal functionality FEAP and the EAP-TNC ideal functionality FE-PA. Then, we construct a trusted network connect protocol named TK-TNC that UC-realizes FTNC in the (FEAP, FE-PA)- hybrid model. Subsequently, we perform a security analysis on protocol D-H PN given in the TCG specification and show that this protocol cannot securely realize the EAP-TNC ideal functionality and be resistant to an attack. Finally, we propose an alternative protocol using the twin Diffie-Hellman key-exchange technique, named protocol TD-H PN, which can securely realize the EAP-TNC ideal functionality in the (FREG, FCERT)-hybrid model.This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality FTNC, the EAP ideal functionality FEAP and the EAP-TNC ideal functionality FE-PA. Then, we construct a trusted network connect protocol named TK-TNC that UC-realizes FTNC in the (FEAP, FE-PA)- hybrid model. Subsequently, we perform a security analysis on protocol D-H PN given in the TCG specification and show that this protocol cannot securely realize the EAP-TNC ideal functionality and be resistant to an attack. Finally, we propose an alternative protocol using the twin Diffie-Hellman key-exchange technique, named protocol TD-H PN, which can securely realize the EAP-TNC ideal functionality in the (FREG, FCERT)-hybrid model.
关 键 词:network security universally composable security trusted network connect
分 类 号:TP311.13[自动化与计算机技术—计算机软件与理论] F276.7[自动化与计算机技术—计算机科学与技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.188.176.130