检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:MA Zhuo LI Fenghua MA Jianfeng JI Wenjiang
机构地区:[1]School of Computer Science and Technology, Xidian University [2]State Key Laboratory of Information Security, Institute of Information Engineering, CAS
出 处:《Chinese Journal of Electronics》2014年第1期142-146,共5页电子学报(英文版)
基 金:supported in part by the National Natural Science Foundation of China(No.U1135002,No.61100233,No.61100230,No.61202389,No.61202390,No.61173135,No.61170251);Fundamental Research Funds for the Central Universities;Natural Science Basic Research Plan in Shaanxi Province of China(No.2012JM8030);Beijing Natural Science Foundation(No.4102056);National High Technology Research and Development Program of China(No.2012AA013102)
摘 要:Based on the certificateless public key cryptography and the trusted computing technologies~ a certificateless based trusted access protocol for WLAN (Wireless local area networks) is proposed. Such proto- col realizes the mutual authentication and unicast session key agreement between STA and AP within 3 protocol rounds. In particular, the platform authentication and in- tegrity verification are achieved during the authentication procedure. The security properties of the new protocol are examined using the Extended Canetti-Krawczyk secu- rity model. The analytic comparisons show that the new protocol is very ei^icient in both computing and communi- cations.Based on the certificateless public key cryptography and the trusted computing technologies, a certificateless based trusted access protocol for WLAN(Wireless local area networks) is proposed. Such protocol realizes the mutual authentication and unicast session key agreement between STA and AP within 3 protocol rounds. In particular, the platform authentication and integrity verification are achieved during the authentication procedure. The security properties of the new protocol are examined using the Extended Canetti-Krawczyk security model. The analytic comparisons show that the new protocol is very efficient in both computing and communications.
关 键 词:Certificateless public key cryptography Wireless local area networks (WLAN) Trusted computing Authentication protocol Provable security.
分 类 号:TN925.93[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.145