编辑推荐
暂无
内容简介
CPK Cryptosystem changes ordinary elliptic curve public key into an identity-based public key with self-assured property. Self-assured public key can advance the authentication logic from object-authenticating "belief logic" to entity-authenticating "trust logic". Self-assured public key system and trust logic of authentication composes the key technique of cyber security. The construction of trust connecting,computing,transaction,logistics,counter-forgery and network management will be the main contents of the next generation of information security. Readers benefited from this book will be researchers and professors, experts and students, developers and policy makers, and all other who are interested in cyber security.
作者简介
暂无
目录
Part One Authentication Technique
Chapter 1 Basic Concepts
1.1 Physical World and Digital world
1.2 A World with Order and without Order
1.3 Self-assured Proof and 3rd Party Proof
1.4 Certification Chain and Trust Chain
1.5 Centralized and Decentralized Management
1.6 Physical Signature and Digital Signature
Chapter 2 Authentication Logic
2.1 Belief Logic
2.2 Standard Protocol
2.3 Trust Relationship
2.3.1 Direct Trust
2.3.2 Axiomatic Trust
2.3.3 Inference Trust
2.4 Trust Logic
2.4.1 The Requirement of Trust Logic
2.4.2 The Progress in Public Key
2.4.3 Entity Authenticity
2.4.4 The Characteristics of Trust Logic
2.5 CPK Protocol
2.5.1 One-way Protocol
2.5.2 Two-way Protocol
Chapter 3 Identity Authentication
3.1 Communication Identity Authentication
3.2 Software Identity Authentication
3.3 Electronic Tag Authentication
3.4 Network Management
3.5 Holistie Security
art Two Crypto- systems
Chapter 4 Combined Public Key (CPK)
4.1 Introduction
4.2 ECC Compounding Feature
4.3 Identity- Key
4.3.1 Combining Matrix
4.3.2 Mapping from Identity to Matrix Coordinates
4.3.3 Computation of Identity-Key
4.4 Key Compounding
4.4.1 The Compounding of Identity-Key and Accompanying-Key (optional)
4.4.2 The Compounding of Identity- Key and Separating- Key
4.5 CPK Digital Signature
4.5.1 Signing with Accompanying- Key (optional)
4.5.2 Signing with Separating-Key
4.6 CPK Key Exchange
4.6.1 Key Exchange with Separating-Key
4.6.2 Key Exchange with Accompanying-Key(optional)
4.7 Security Analysis
Chapter 5 Self-assured and 3rd Party Public Key
5.1 New Requirements of the Crypto-System
5.2 Deve]opment of Crypto-Systems
5.3 Digital Signature Mechanism
5.3.1 IBC Signature Scheme
5.3.2 CPK Signature with Separating-Key
5.3.3 CPK Signature with Accompanying-Key
5.3.4 PKI Signature Scheme
5.3.5 IB-RSA Signature Scheme
5.3.6 mRSA Signature Scheme
5.3.7 Comparison of Schemes
5.4 Key Exchange Scheme
……
Part Three CPK System
Part Five Trust Connecting
part Six Trust e-Commerce
Part Seven Trust Logistics
Part Eight File &; Network Management
Appendices
网际安全技术构架:基于标识鉴别的可信系统(英文版) pdf下载声明
本pdf资料下载仅供个人学习和研究使用,不能用于商业用途,请在下载后24小时内删除。如果喜欢,请购买正版