首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种在线CA安全增强方案
引用本文:谭玉玲,王新林.一种在线CA安全增强方案[J].云南师范大学学报(自然科学版),2009,29(4):39-41,45.
作者姓名:谭玉玲  王新林
作者单位:广东罗定职业技术学院电子信息工程系,广东,罗定,527200
摘    要:CA私钥的安全性决定了签发证书的有效性。基于ECC(椭圆曲线算法)和(t,n)门限密码技术,结合先应秘密共享机制,提出了一种容侵的CA私钥保护方案。方案通过(t,n)秘密共享机制把CA私钥分发到t个服务器,并通过先应秘密共享体制进行私钥份额动态更新,结合可验证的秘密共享(VSS)方案,实现了CA私钥的容侵保护。最后,通过Java和Openssl对系统进行了实现。结果表明,本方案比目前基于RSA的同类方案相比,具有更高的安全性和效率。

关 键 词:CA私钥  椭圆曲线算法  容侵  门限密码学  先应秘密共享

Security enhancement Scheme of Online CA
TAN Yu-ling,WANG Xin-lin.Security enhancement Scheme of Online CA[J].Journal of Yunnan Normal University (Natural Sciences Edition),2009,29(4):39-41,45.
Authors:TAN Yu-ling  WANG Xin-lin
Institution:TAN Yu -ling, WANG Xin -lin (LuoDing Vocational and Technical college, LuoDing 527200,China)
Abstract:Abstract:Protecting the CA private key is the key issue of the whole PKI. An intrusion tolerant protection scheme of CA private key was proposed basing on the ECC and (t, n) secret shared method and proactive secret share. The scheme ensure that the private key never be reunion at any time. At the same time ,in the proceeding of CA generated, delivered and used, even if some part of the CA is broken, the CA private key is still safe. Thus, it ensures the validity of the digital certificate delivered by the online CA. At last, the system was realized by Java and Openssl.
Keywords:CA private key  ECC  Intrusion tolerant  threshold cryptology  Proactive secret share
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号