CL-TAP: An Efficient Certificateless Based Trusted Access Protocol for WLAN  被引量:1

CL-TAP: An Efficient Certificateless Based Trusted Access Protocol for WLAN

在线阅读下载全文

作  者:MA Zhuo LI Fenghua MA Jianfeng JI Wenjiang 

机构地区:[1]School of Computer Science and Technology, Xidian University [2]State Key Laboratory of Information Security, Institute of Information Engineering, CAS

出  处:《Chinese Journal of Electronics》2014年第1期142-146,共5页电子学报(英文版)

基  金:supported in part by the National Natural Science Foundation of China(No.U1135002,No.61100233,No.61100230,No.61202389,No.61202390,No.61173135,No.61170251);Fundamental Research Funds for the Central Universities;Natural Science Basic Research Plan in Shaanxi Province of China(No.2012JM8030);Beijing Natural Science Foundation(No.4102056);National High Technology Research and Development Program of China(No.2012AA013102)

摘  要:Based on the certificateless public key cryptography and the trusted computing technologies~ a certificateless based trusted access protocol for WLAN (Wireless local area networks) is proposed. Such proto- col realizes the mutual authentication and unicast session key agreement between STA and AP within 3 protocol rounds. In particular, the platform authentication and in- tegrity verification are achieved during the authentication procedure. The security properties of the new protocol are examined using the Extended Canetti-Krawczyk secu- rity model. The analytic comparisons show that the new protocol is very ei^icient in both computing and communi- cations.Based on the certificateless public key cryptography and the trusted computing technologies, a certificateless based trusted access protocol for WLAN(Wireless local area networks) is proposed. Such protocol realizes the mutual authentication and unicast session key agreement between STA and AP within 3 protocol rounds. In particular, the platform authentication and integrity verification are achieved during the authentication procedure. The security properties of the new protocol are examined using the Extended Canetti-Krawczyk security model. The analytic comparisons show that the new protocol is very efficient in both computing and communications.

关 键 词:Certificateless public key cryptography Wireless local area networks (WLAN) Trusted computing Authentication protocol Provable security. 

分 类 号:TN925.93[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象