ID |
原文 |
译文 |
45166 |
为此,提出一种面向云计算协议组合逻辑(PCL, protocol composition logic)安全的用户认证协议(UCAP)。 |
Based on this, a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed. |
45167 |
UCAP 引入了可信第三方,使用基于对称加密密钥的认证方法,确保参与认证双方的相互认证,实现协议会话的认证性和密钥机密性。 |
The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase. |
45168 |
协议主要分成 2 个阶段:初始认证阶段,由可信第三方生成根会话密钥后,认证双方相互认证; |
In the initial authentication phase, the trusted third party generated a root communication session key. |
45169 |
重认证阶段,不需要可信第三方的参与,认证双方快速生成子会话密钥并实现相互认证。 |
In the re-authentication phase, communication users negotiated a sub session key without the trusted third party. |
45170 |
在协议组合逻辑模型下给出所提协议的形式化描述并利用顺序组合证明方法分析了所提协议的安全属性。 |
To verify the security properties of the protocol, a sequential compositional proof method was used under the protocol composition logic model. |
45171 |
同其他相关协议比较及实验分析表明,UCAP 在不影响安全性的前提下,提高了用户认证的通信与计算效率,不但在重认证阶段不依赖可信第三方,而且整个过程不依赖可信第三方同步时钟。 |
Compared with certain related works,the proposed protocol satisfies the PCL security. The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes, while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party. |
45172 |
传统的模板攻击需要已知密钥建模等对实验设备完全控制的前置条件来实施攻击, |
The known-key establishment template and others full control of experimental equipment preconditions are required to implement the traditional template attack. |
45173 |
该前置条件限制了模板攻击的应用场景, |
The preconditions restrict the application scenario of template at-tack. |
45174 |
使模板攻击只能应用于可以控制密钥输入的设备。 |
The template attack is only applied to the device that the key input can be controlled. |
45175 |
为了解决该问题,提出了基于聚类的模板攻击方法。 |
In order to resolve the restrictive preconditions, a novel method of template attack based on clustering was proposed. |