首页 | 官方网站   微博 | 高级检索  
     

Sequence Patterns of Identity Authentication Protocols
作者姓名:陶宏才  何大可
作者单位:School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China
摘    要:From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TFP). Ten feasible sequence patterns of authentication protocol with TIP and 5 sequence patterns without TFP are gained. These gained sequence patterns meet the requirements for identity authentication, and basically cover almost all the authentication protocols with TFP and without TFP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then, according to the sequence symmetry, several good sequence patterns with TFP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

关 键 词:程序  模型  鉴别方法  协议  信息科学
文章编号:1005-2429(2006)03-0205-07
收稿时间:2005-08-10

Sequence Patterns of Identity Authentication Protocols
Tao Hongcai,He Dake.Sequence Patterns of Identity Authentication Protocols[J].Journal of Southwest Jiaotong University,2006,14(3):205-211.
Authors:Tao Hongcai  He Dake
Abstract:From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication, and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then, according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.
Keywords:Authentication protocol  Identity authentication  Sequence pattern  TTP
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号