信息安全研究 ›› 2016, Vol. 2 ›› Issue (7): 649-659.

• CFL认证研究专题 • 上一篇    下一篇

认证体制研究

李聪聪   

  1. 北京交通大学
  • 收稿日期:2016-07-14 出版日期:2016-07-15 发布日期:2016-07-14
  • 通讯作者: 李聪聪

The Overview of Authentication Systems

  • Received:2016-07-14 Online:2016-07-15 Published:2016-07-14

摘要: 互联网的开放性和匿名性使得安全问题越来越突出.认证体制是网络安全的第1道大门,它确保网络传输的信息资源只能被合法用户所访问,因此身份认证技术是整个信息安全的基础.身份认证技术已成为网络安全研究的一个重要方面,在介绍公钥基础设施(public key infrastructure, PKI)证书认证体制、基于标识的密码技术(identitybased cryptograph, IBC)标识认证体制的基础上,梳理了它们的功能和不足.面对这些功能和不足,人们发明了基于标识的证书认证体制CFL.初步介绍了CFL的特点.

关键词: 认证体制, 身份认证, 公钥基础设施, 基于标识的密码技术, CFL (Chen, Fan, and Lü)

Abstract: The security problems of internet are more and more serious because of its openness and anonymity. The first step of the network security authentication scheme is certification system. It ensures that the information resources transmitted on network can only be accessed by legitimate users, so that the identity authentication technology is the foundation of the whole information security. It also becomes one important aspect of the network security, this paper summarizes the functions and shortages of PKI certificate authentication system and IBC identity authentication system based on the introduction of them. The characteristics of the CFL are introduced preliminarily.

Key words: authentication system, identity authentication, public key infrastructure (PKI), identitybased cryptograph (IBC), CFL (Chen, Fan, and Lü)