An Identity-Based Authentication Scheme in Cloud Computing

被引:6
|
作者
Zhang, Zhi-Hua [1 ]
Jiang Xue-Feng [1 ]
Li, Jian-Jun [1 ]
Jiang, Wei [2 ,3 ,4 ]
机构
[1] China Tobacco Zhejiang Ind Co Ltd, Hangzhou 310009, Zhejiang, Peoples R China
[2] Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
[3] Minist Publ Secur, Res Inst 3, Key Lab Informat & Network Security, Shanghai 201204, Peoples R China
[4] Chinese Acad Sci, Inst Software, State Key Lab Informat Security, Beijing 100049, Peoples R China
关键词
Cloud computing; identity-based authentication; CDHP; Bilinear map;
D O I
10.1109/ICICEE.2012.261
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is a hot topic of current research, and identity-based authentication is important in many applications scenarios of e-business based on cloud computing, in these e-business scenarios users should prove the user's legacy, and the enterprise needs to determine whether the user has the right popedom, so this paper presents a identity-based authentication scheme for this applications, and this scheme avoids the issues how to revocation public key certificate and the escrow problem of key, and then the security of the scheme is analyzed, at last the communication process of the identity-based authentication scheme is described.
引用
收藏
页码:984 / 986
页数:3
相关论文
共 50 条
  • [21] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234
  • [22] Escrow-Less Identity-Based Signature Scheme with Outsourced Protection in Cloud Computing
    Mahender Kumar
    Satish Chand
    [J]. Wireless Personal Communications, 2020, 114 : 3115 - 3136
  • [23] Escrow-Less Identity-Based Signature Scheme with Outsourced Protection in Cloud Computing
    Kumar, Mahender
    Chand, Satish
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 3115 - 3136
  • [24] On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Shamshad, Salman
    Rana, Minahil
    Mahmood, Khalid
    Khan, Muhammad Khurram
    Obaidat, Mohammad S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) : 283 - 292
  • [25] On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
    Salman Shamshad
    Minahil Rana
    Khalid Mahmood
    Muhammad Khurram Khan
    Mohammad S. Obaidat
    [J]. Wireless Personal Communications, 2022, 124 : 283 - 292
  • [26] Identity-Based Encryption with Outsourced Revocation in Cloud Computing
    Li, Jin
    Li, Jingwei
    Chen, Xiaofeng
    Jia, Chunfu
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 425 - 437
  • [27] Simultaneous authentication and secrecy in identity-based data upload to cloud
    Qin, Bo
    Wang, Huaqun
    Wu, Qianhong
    Liu, Jianwei
    Domingo-Ferrer, Josep
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 845 - 859
  • [28] Simultaneous authentication and secrecy in identity-based data upload to cloud
    Bo Qin
    Huaqun Wang
    Qianhong Wu
    Jianwei Liu
    Josep Domingo-Ferrer
    [J]. Cluster Computing, 2013, 16 : 845 - 859
  • [29] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02) : 254 - 259
  • [30] Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing
    YANG Yanyan
    HU Mingsheng
    KONG Shan
    GONG Bei
    LIU Xinxin
    [J]. Wuhan University Journal of Natural Sciences, 2019, 24 (02) : 134 - 140