An Identity-Based Authentication Scheme in Cloud Computing

被引:6
|
作者
Zhang, Zhi-Hua [1 ]
Jiang Xue-Feng [1 ]
Li, Jian-Jun [1 ]
Jiang, Wei [2 ,3 ,4 ]
机构
[1] China Tobacco Zhejiang Ind Co Ltd, Hangzhou 310009, Zhejiang, Peoples R China
[2] Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
[3] Minist Publ Secur, Res Inst 3, Key Lab Informat & Network Security, Shanghai 201204, Peoples R China
[4] Chinese Acad Sci, Inst Software, State Key Lab Informat Security, Beijing 100049, Peoples R China
关键词
Cloud computing; identity-based authentication; CDHP; Bilinear map;
D O I
10.1109/ICICEE.2012.261
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is a hot topic of current research, and identity-based authentication is important in many applications scenarios of e-business based on cloud computing, in these e-business scenarios users should prove the user's legacy, and the enterprise needs to determine whether the user has the right popedom, so this paper presents a identity-based authentication scheme for this applications, and this scheme avoids the issues how to revocation public key certificate and the escrow problem of key, and then the security of the scheme is analyzed, at last the communication process of the identity-based authentication scheme is described.
引用
收藏
页码:984 / 986
页数:3
相关论文
共 50 条
  • [1] Identity-Based Authentication for Cloud Computing
    Li, Hongwei
    Dai, Yuanshun
    Tian, Ling
    Yang, Haomiao
    [J]. CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166
  • [2] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [3] An Identity-Based Authentication Scheme With Full Anonymity and Unlinkability for Mobile Edge Computing
    Tian, Junfeng
    Wang, Yiting
    Shen, Yue
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23561 - 23576
  • [4] Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments
    Huo, Shi-Wei
    Luo, Chang-Yuan
    Xin, Hong-Zhi
    [J]. INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 314 - 320
  • [5] A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Jia, Xiaoying
    Luo, Min
    Choo, Kim-Kwang Raymond
    Li, Li
    He, Debiao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 10108 - 10120
  • [6] Retraction Note: An identity authentication scheme based on cloud computing environment
    Manjun Zhang
    Zheng Ma
    Yan Zhang
    Yongbin Wang
    [J]. Multimedia Tools and Applications, 2022, 81 : 44525 - 44525
  • [7] Identity-Based Authentication Scheme for the Internet of Things
    Salman, Ola
    Abdallah, Sarah
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    [J]. 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
  • [8] RETRACTED ARTICLE: An identity authentication scheme based on cloud computing environment
    Manjun Zhang
    Zheng Ma
    Yan Zhang
    Yongbin Wang
    [J]. Multimedia Tools and Applications, 2018, 77 : 4283 - 4294
  • [9] A New Identity-based Authentication Scheme for SIP
    Peng, Shengbo
    Ruan, Ou
    Zhou, Jing
    Chen, Zaixing
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 90 - 95
  • [10] A Secure Identity-Based Dynamic Group Data Sharing Scheme for Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    Lai, Chin-Feng
    Ren, Yongjun
    Sun, Xingming
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 833 - 842