作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程

• 安全技术 • 上一篇    下一篇

基于无证书签名的云端跨域身份认证方案

杨小东1,2,安发英1,杨平1,刘婷婷1,王彩芬1   

  1. (1.西北师范大学 计算机科学与工程学院,兰州 730070; 2.密码科学技术国家重点实验室,北京 100878)
  • 收稿日期:2016-12-28 出版日期:2017-11-15 发布日期:2017-11-15
  • 作者简介:杨小东(1981—),男,副教授、博士,主研方向为代理重签名、云计算安全;安发英、杨平、刘婷婷,硕士研究生;王彩芬,教授、博士、博士生导师。
  • 基金资助:
    国家自然科学基金(61662069,61262057);中国博士后科学基金(2017M610817);甘肃省科技计划项目(145RJDA325,1506RJZA130);国家档案局科技计划项目(2014-X-33);甘肃省高等学校科研项目(2014-A011);兰州市科技计划项目(2013-4-22);西北师范大学青年教师科研能力提升计划项目(NWNU-LKQN-14-7)。

Cross-domain Identity Authentication Scheme in Cloud Based on Certificateless Signature

YANG Xiaodong 1,2,AN Faying 1,YANG Ping 1,LIU Tingting 1,WANG Caifen 1   

  1. (1.College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China; 2.State Key Laboratory of Cryptology,Beijing 100878,China)
  • Received:2016-12-28 Online:2017-11-15 Published:2017-11-15

摘要: 针对基于无证书的身份认证方案无法满足跨域匿名认证需求的不足,利用双线性映射提出一种云环境下的跨域身份认证方案。基于无证书签名的合法性和消息的有效性,实现用户与云服务提供商的身份真实性鉴别,并在双向跨域认证过程中完成会话密钥的协商。引入分层ID树结构确保身份的唯一性,“口令+密钥”的双因子认证过程增强跨域身份认证方案的安全性。利用临时身份实现用户身份的匿名性,对用户的恶意匿名行为具有可控性。分析结果表明,该认证方案在CK模型中是安全的,并能抵抗伪造、重放与替换攻击,具有较高的安全性。

关键词: 云计算, 跨域, 无证书签名, 身份认证, CK模型, 匿名性

Abstract: In view of the shortcoming of failure in cross-domain anonymous authentication scheme based on certificateless public key cryptography,a cross-domain authentication scheme in cloud environment is proposed by using bilinear mapping.On the basis of the validity of certificateless signature and the legitimacy of the message,the proposed scheme can identify the authenticity of user and cloud service provider,and the negotiation of the session key is completed in the bidirectional cross-domain authentication process.Furthermore,the introduction of hierarchical ID tree structure ensures the uniqueness of identity,and the two-factor authentication process of "password + key" strengthens the security of the cross-domain authentication scheme.The scheme realizes the anonymity of user identity by using temporary identity and has controllability for anonymous malicious behavior.Analysis results show that the proposed scheme is secure in CK model,it can resist forgery attacks,replay attacks and replace attacks,and has higher safety performance.

Key words: cloud computing, cross-domain, certificateless signature, identity authentication, CK model, anonymity

中图分类号: