计算机应用 ›› 2005, Vol. 25 ›› Issue (12): 2731-2733.

• 信息安全 • 上一篇    下一篇

用隐藏证书实现访问策略

洪帆刘磊   

  1. 华中科技大学计算机科学与技术学院
  • 收稿日期:1900-01-01 修回日期:1900-01-01 发布日期:2005-12-01 出版日期:2005-12-01

Implementing access policies with hidden credentials

<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>H<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>O<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>N<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>G<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>F<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>a<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>n<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>,<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>L<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>I<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>U<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>L<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>e<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>i<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>   

  1. Institute of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan Hubei 430074,China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2005-12-01 Published:2005-12-01

摘要: 为解决在信任管理系统中使用隐藏证书的效率问题,借助于策略表达式和结束前缀,给出了一种使用隐藏证书有效实现复杂访问策略的方案,通过构造策略表达式并对其化简减少了加密和解密的次数,通过“结束前缀”方便了信息的还原。实例显示该方案具有较好的可行性和效率。

关键词: 隐藏证书, 访问策略, 信任协商

Abstract: To solve the efficiency problem of useing hidden credentials in trustmanagement system,a scheme using hidden credentials to efficiently implement complex polices with "polices expression" and "final prefix" was presented.The encryption and decipherment times were reduced by constructing and simplifying policy expression,the information restore was guaranteed by useing "final prefix".Example shows that the scheme is feasible and efficiency.

Key words: hidden credentials, access policies, trust negotiation

中图分类号: