[1]蒋华[] [],潘文吉[],胡荣磊[]. 基于环签名的SIP认证方案设计[J].计算机技术与发展,2016,26(03):140-143.
 JIANG Hua[][],PAN Wen-ji[],HU Rong-lei[]. Design of SIP Authentication Scheme Based on Ring Signature[J].,2016,26(03):140-143.
点击复制

 基于环签名的SIP认证方案设计()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年03期
页码:
140-143
栏目:
应用开发研究
出版日期:
2016-03-10

文章信息/Info

Title:
 Design of SIP Authentication Scheme Based on Ring Signature
文章编号:
1673-629X(2016)03-0140-04
作者:
 蒋华[1] [2]潘文吉[1] 胡荣磊[2]
 1.西安电子科技大学;2.北京电子科技学院
Author(s):
 JIANG Hua[1][2] PAN Wen-ji[1] HU Rong-lei[2]
关键词:
 会话初始协议身份认证环签名RSA DES
Keywords:
 SIPauthenticationring signatureRSADES
分类号:
TP302.1
文献标志码:
A
摘要:
 针对在使用公共网络资源情况下,中小型企业采用SIP构建的Presence/IM业务存在的注册劫持和注册删除的隐患,提出了一种基于RSA和DES结合的环签名安全匿名认证方案。方案首先构建一个可信域,公开域内的所有用户的公钥,然后在SIP的注册和注销过程中添加环签名认证,在整个过程中,不需要第三方参与验证,用户对于服务器是匿名的,服务器只能判断请求是否来自可信用户群,而无法从签名中获得用户身份。相比于其他常用的安全认证,环签名除了能够有效认证签名的合法性,无条件的匿名性也可以保护用户信息,在云计算等公共网络环境中减少用户信息的泄露,同时具有部署效率高,证明过程便捷的优势。最后通过运算证明方案的正确性,构建安全模型说明了方案的安全性和可行性,并采用OpenSSL验证方案的效率。
Abstract:
 Under the public network,the Presence/IM established by small and middle sized enterprises with SIP exists the risks of regis-tration hijacking and registration deleting. Aiming at this hidden danger,a security authentication scheme using ring signature based on a combination of RSA and DES is proposed. First,it builds a trusted domain and public the public key to the users in the domain. Then the scheme adds the ring signature to SIP registration and deregistration process,without the third party. For the server,users are anonymous and just knew in the domain. Compared with other security authentication,the ring signature not only ensures the legality of users,but also provides anonymity to protect user information,which will be reduced in the cloud and other public network. At the same time,it has effi-cient deployment and convenient proof. Last,it proves the correctness by computing in this paper,also shows the safety and feasibility by building security model. In addition,the efficiency of the scheme is verified by using OpenSSL.

相似文献/References:

[1]韩小燕 曾桂根 李敏.SIP中NAT穿透技术的研究及实现[J].计算机技术与发展,2011,(01):193.
 HAN Xiao-yan,ZENG Gui-gen,LI Min.Research and Implementation of SIP Traversal NAT[J].,2011,(03):193.
[2]蔡则高 管有庆.基于JXTA的P2PSIP系统研究与实现[J].计算机技术与发展,2011,(07):175.
 CAI Ze-gao,GUAN You-qing.Research and Implementation of P2PSIP System Based on JXTA[J].,2011,(03):175.
[3]李杨,熊淑华,李梦涵,等.基于SIP协议的实时通信系统研究与实现[J].计算机技术与发展,2014,24(04):53.
 LI Yang,XIONG Shu-hua,LI Meng-han,et al.Research and Realization of Real-time Communication System Based on SIP[J].,2014,24(03):53.
[4]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(03):1.
[5]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(03):5.
[6]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(03):13.
[7]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(03):21.
[8]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(03):25.
[9]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(03):29.
[10]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(03):34.

更新日期/Last Update: 2016-06-14