Indexed by:
Abstract:
To implement the anonymous authentication with key agreement protocol and protection of the communicating parties identity secret effectively, a TPM based authentication key agreement protocol with one-way anonymous was proposed. The protocol was based on trusted computing platform, the introduction of TPM technology, not only had a range of key agreement protocol security properties, but also the communication party members without revealing the true identity of the premise to verify each other with some kind of membership, provided a more good security for the limited computing and storage resources applications.
Keyword:
Reprint Author's Address:
Email:
Source :
Journal of Beijing University of Technology
ISSN: 0254-0037
Year: 2012
Issue: 9
Volume: 38
Page: 1372-1376
Cited Count:
WoS CC Cited Count: 0
SCOPUS Cited Count:
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 10
Affiliated Colleges: