Computer Engineering and Applications ›› 2013, Vol. 49 ›› Issue (1): 82-85.

Previous Articles     Next Articles

Fault intrusion-tolerance signature protocol

MI Junli1, XIE Shucui2, ZHANG Jianzhong3   

  1. 1.School of Mathematics and Physical Science, Xuzhou Institute of Technology, Xuzhou, Jiangsu 221008, China
    2.Department of Applied Mathematics and Applied Physics, Xi’an University of Posts and Telecommunications, Xi’an 710061, China
    3.College of Mathematics and Information Science, Shaanxi Normal University, Xi’an 710062, China
  • Online:2013-01-01 Published:2013-01-16

有条件容忍入侵的数字签名协议

米军利1,谢淑翠2,张建中3   

  1. 1.徐州工程学院 数学与物理科学学院,江苏 徐州 221008
    2.西安邮电学院 应用数理系,西安 710061
    3.陕西师范大学 数学与信息科学学院,西安 710062

Abstract: CA private key is shared based on the new (t, n) secret sharing mechanism. It uses its identification as a share of the private key. Rather than prevent intrusions or detect them after the fact, the project ensures that the compromise of a few system components does not compromise the private key of the CA. These policies of intrusion tolerance, by adjusting the use of cryptographic protocol, and tolerating or preventing part of attacks, protect the safety of cryptographic protocol performance. The approach has realized the security and robustness for the key functions of a database system by using the integration security strategy and multiple security measures.

Key words: Certificate Authority(CA), intrusion-tolerance, secret sharing, cryptographic protocol, network security

摘要: 基于新的(t,n)秘密共享机制将CA私钥进行分存,使用其身份作为私钥份额的标识,提供私钥保护的容侵性。该协议不是从保护系统或检测入侵出发来保证CA 的安全,而是确保当少数部件被攻击或占领后,CA系统的机密信息并没有暴露;能根据攻击的类型,动态调节密码协议的运行,以容忍、阻止一部分攻击行为,更好地保护密码协议的运行安全。协议采用系统整体安全策略,综合多种安全措施,实现了系统关键功能的安全性和健壮性。

关键词: 认证机构(CA), 容忍入侵, 秘密分享, 密码协议, 网络安全