| 注册
首页|期刊导航|西南交通大学学报(英文版)|Sequence Patterns of Identity Authentication Protocols

Sequence Patterns of Identity Authentication Protocols

Tao Hongcai He Dake

西南交通大学学报(英文版)2006,Vol.14Issue(3):205-211,7.
西南交通大学学报(英文版)2006,Vol.14Issue(3):205-211,7.

Sequence Patterns of Identity Authentication Protocols

Sequence Patterns of Identity Authentication Protocols

Tao Hongcai 1He Dake1

作者信息

  • 1. School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China
  • 折叠

摘要

Abstract

From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

关键词

Authentication protocol/Identity authentication/Sequence pattern/TTP

Key words

Authentication protocol/Identity authentication/Sequence pattern/TTP

分类

交通工程

引用本文复制引用

Tao Hongcai,He Dake..Sequence Patterns of Identity Authentication Protocols[J].西南交通大学学报(英文版),2006,14(3):205-211,7.

西南交通大学学报(英文版)

2662-4745

访问量0
|
下载量0
段落导航相关论文