ID Authentication in PTPM and Public Key Cryptography in Cloud Environment

被引:0
|
作者
Xia, Hui [1 ]
机构
[1] Shenyang Normal Univ, Software Coll, Shenyang, Liaoning, Peoples R China
关键词
cloud computing; ID authentication; PTPM; certificateless public key cryptography;
D O I
10.1109/ICISCE.2018.00061
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To tackle the problems of security threat and the shortcomings in the process of ID authentication between user and cloud, this paper applies Portable TPM chip and certificateless public key cryptography for the first time to solve the issues in the cloud environment, and proposes a scheme for bidirectional ID authentication between user and cloud. Compared with previous authentication schemes, the proposed scheme has the several advantages. First, based on the unique identity of user and cloud by the identity management mechanism, portable TPM can not only achieves secure and trusted terminal platform, which ensures the authentication result between user and cloud is correct and valid, but also supports the objectives of ID authentication between user and cloud in user's any terminal device. Furthermore, Dual-factor ID authentication (password + key) is implemented with certificateless public key signature algorithm provided by the new scheme. Finally, security proof and performance analysis show that this proposed scheme has the security level of EUF-CMA, and the computation overhead of ID authentication between user and cloud is significantly improved.
引用
收藏
页码:256 / 260
页数:5
相关论文
共 50 条
  • [21] Chip-to-Chip Authentication Method Based on SRAM PUF and Public Key Cryptography
    Ioannis Karageorgos
    Mehmet M. Isgenc
    Samuel Pagliarini
    Larry Pileggi
    Journal of Hardware and Systems Security, 2019, 3 (4) : 382 - 396
  • [22] Securing networked image transmission using public-key cryptography and identity authentication
    Gowda, V. Dankan
    Kumar, Pullela S. V. V. S. R.
    Latha, J.
    Selvakumar, C.
    Shekhar, R.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 779 - 791
  • [23] Demystifying public key cryptography
    Wasilewski, T.
    CED (Denver, CO), 22 (05):
  • [24] Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment
    Abduljabbar, Zaid Ameen
    Jin, Hai
    Hussien, Zaid Alaa
    Yassin, Ali A.
    Hussain, Mohammed Abdulridha
    Abbdal, Salah H.
    Zou, Deqing
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 146 - 151
  • [25] Background on public key cryptography
    GROUP-BASED CRYPTOGRAPHY, 2008, : 3 - 7
  • [26] An overview of public key cryptography
    Hellman, ME
    IEEE COMMUNICATIONS MAGAZINE, 2002, : 42 - 49
  • [27] Public key cryptography with matrices
    Singh, MK
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 146 - 152
  • [28] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [29] Certificateless public key cryptography
    Al-Riyami, SS
    Paterson, KG
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 452 - 473
  • [30] Computing public key cryptography
    Elektron, 2000, 17 (08): : 54 - 57