西南交通大学学报(英文版)2006,Vol.14Issue(3):205-211,7.
Sequence Patterns of Identity Authentication Protocols
Sequence Patterns of Identity Authentication Protocols
Tao Hongcai 1He Dake1
作者信息
- 1. School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China
- 折叠
摘要
Abstract
From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.关键词
Authentication protocol/Identity authentication/Sequence pattern/TTPKey words
Authentication protocol/Identity authentication/Sequence pattern/TTP分类
交通工程引用本文复制引用
Tao Hongcai,He Dake..Sequence Patterns of Identity Authentication Protocols[J].西南交通大学学报(英文版),2006,14(3):205-211,7.