An Improved Kerberos Intra-domain Authentication Protocol Based-On Certificateless Public-Key Cryptography

被引:0
|
作者
Wang Juan [1 ]
Cao Man-cheng [1 ]
Fang Yuan-kang [1 ]
机构
[1] Chizhou Coll, Chizhou, Anhui, Peoples R China
来源
ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 2 | 2011年 / 129卷
关键词
Kerberos; Intra-domain Authentication; Security Attributes; Certificateless Public key cryptography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper sums up some improvements in Kerberos intra-domain authentication protocol included in many domestic and foreign literatures. By analyzing the limitations of those improvement schemes, an improvement in Kerberos intra-domain authentication protocol based on certificateless public-key thought is proposed. The analysis shows that the improvement proposal can overcome some defects in the original Kerberos intra-domain authentication protocol, such as the key escrow problem and network intermediaries attack, etc. Moreover, the improvement also meets the demand of security proposed by key agreement protocol, which has a certain security and perspective of application in the process of network identity authentication.
引用
收藏
页码:489 / 496
页数:8
相关论文
共 50 条
  • [21] The improved Public Key Encryption Algorithm of Kerberos Protocol based on Braid Groups
    Jia, Ke
    Chen, Xiaojun
    Xu, Guanghua
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12551 - +
  • [22] A secure hash-based strong-password authentication protocol using one-time public-key cryptography
    Kim, Minho
    Koc, Cetin Kaya
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (04) : 1213 - 1227
  • [23] A Petri net based public-key cryptography: PNPKC
    Ge, QW
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (06): : 1532 - 1535
  • [24] Public-Key Cryptography Based on Tropical Circular Matrices
    Huang, Huawei
    Li, Chunhua
    Deng, Lunzhi
    APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [25] AN ATTACK ON THE NEEDHAM-SCHROEDER PUBLIC-KEY AUTHENTICATION PROTOCOL
    LOWE, G
    INFORMATION PROCESSING LETTERS, 1995, 56 (03) : 131 - 133
  • [26] Securing networked image transmission using public-key cryptography and identity authentication
    Gowda, V. Dankan
    Kumar, Pullela S. V. V. S. R.
    Latha, J.
    Selvakumar, C.
    Shekhar, R.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 779 - 791
  • [27] A Provable Secure Scheme Based on Certificateless Public Key Cryptography
    Wang, Yanhong
    Ye, Junyao
    Ye, Junyao
    3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 14 - 18
  • [28] Research on Hadoop Identity Authentication Based on Improved Kerberos Protocol
    Hu, Daming
    Chen, Deyun
    Zhang, Yuanxu
    Pei, Shujun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 429 - 438
  • [29] Design choices for public key based Kerberos authentication system
    Varadharajan, V
    Mu, Y
    Hitchens, M
    PROCEEDINGS OF THE 21ST AUSTRALASIAN COMPUTER SCIENCE CONFERENCE, ACSC'98, 1998, 20 (01): : 539 - 550
  • [30] A denial-of-service resistant public-key authentication and key establishment protocol
    Fung, CK
    Lee, MC
    CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 171 - 178