Journal of Information Security Research ›› 2016, Vol. 2 ›› Issue (7): 600-607.

Previous Articles     Next Articles

Comparative Study on the Properties of CFL


  • Received:2016-07-14 Online:2016-07-15 Published:2016-07-14



  1. 中科国民科学技术研究院、北京博文广成信息安全技术有限公司
  • 通讯作者: 范修斌

Abstract: Based on the abstract workflow of PKI, IBC and CFL, this paper makes the comparative research of PKI, IBC and CFL, from the independence between users working key and centers key, the function of the users information in certificate, the production methods to identity as public key, one person one private key, individual identification, security degree of center, isolation between users work and its entity being proved, selforganization ability in application, protection of personal privacy, computing speed, application environment, program being authentication, cost of the building and being used, then the Properties of CFL are given clearly.

Key words: authentication system, public key infrastructure (PKI), identitybased cryptography (IBC), CFL (Chen, Fan, and Lü), one person one private key

摘要: 在PKI(public key infrastructure),IBC(identitybased cryptography),CFL抽象工作流程的基础上,从用户工作公钥与中心的独立性、用户信息的功能、标识即公钥的产生方式方面、一人一密、单兵识别、中心可信根的安全强度、用户工作与被证明的隔离、应用中的自组织能力、个人隐私保护、计算速度、应用环境、支持进程级认证、建设成本和能耗等方面对PKI,IBC,CFL进行了比较研究,清晰给出了CFL的特点.

关键词: 认证体制, PKI, IBC, CFL (Chen, Fan, and Lü), 一人一密