Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
A security algorithm based on SM9 for interdomain communication
by
Li, Yang
, Cheng, Huayang
, Wang, Dan
, Dong, Liangyu
, Gu, Junjie
, Yan, Jing
in
Algorithms
/ Authentication
/ Security
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A security algorithm based on SM9 for interdomain communication
by
Li, Yang
, Cheng, Huayang
, Wang, Dan
, Dong, Liangyu
, Gu, Junjie
, Yan, Jing
in
Algorithms
/ Authentication
/ Security
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A security algorithm based on SM9 for interdomain communication
Journal Article
A security algorithm based on SM9 for interdomain communication
2024
Request Book From Autostore
and Choose the Collection Method
Overview
In interdomain communication, confirming member identity and ensuring security is critical, yet identity forgery remains a challenge. Traditional solutions rely on a Certification Authority (CA) to issue authentication certificates and create a trust chain for identity verification. However, different security domains often have incompatible signature mechanisms, complicating certificate management and authentication. We propose a novel ring signature algorithm based on SM9 to address these issues. This algorithm enables member authentication across different domains, ensuring security irrespective of signature mechanisms and certificate versions. With ring signatures, members can authenticate their identities without revealing them to the CA, reducing certificate management burdens and enhancing system flexibility and compatibility. We provide algorithm correctness proofs and conduct security analyses to support practical implementation for identity authentication and communication security.
Publisher
IOP Publishing
Subject
This website uses cookies to ensure you get the best experience on our website.