收录:
摘要:
To implement the anonymous authentication with key agreement protocol and protection of the communicating parties identity secret effectively, a TPM based authentication key agreement protocol with one-way anonymous was proposed. The protocol was based on trusted computing platform, the introduction of TPM technology, not only had a range of key agreement protocol security properties, but also the communication party members without revealing the true identity of the premise to verify each other with some kind of membership, provided a more good security for the limited computing and storage resources applications.
关键词:
通讯作者信息:
电子邮件地址: