Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments

被引:0
|
作者
Huo, Shi-Wei [1 ]
Luo, Chang-Yuan [1 ]
Xin, Hong-Zhi [1 ]
机构
[1] Informat Engn Univ, Elect Technol Inst, Zhengzhou 450004, Peoples R China
来源
INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II | 2011年 / 135卷
关键词
pervasive computing; inter-domain authentication; Identity-based cryptography; anonymity;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An Identity-based signature scheme is proposed based on additive elliptic curve group. The verification result of the signature is a constant with respect to the signer's identifier. Then an inter-domain authentication scheme is constructed by combining the proposed signature scheme. During the authentication, a user constructs the signature of timestamp as authentication proof, which realizes secure inter-domain authentication and user anonymity. It is showed that the proposed scheme has superiority in both security and efficiency, and is more suitable for pervasive computing.
引用
收藏
页码:314 / 320
页数:7
相关论文
共 50 条
  • [1] An inter-domain authentication scheme for pervasive computing environment
    Yao, Lin
    Wang, Lei
    Kong, Xiangwei
    Wu, Guowei
    Xia, Feng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 234 - 244
  • [2] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [3] Identity-based secure inter-domain routing protocol
    Wang, Na
    Zhi, Ying-Jian
    Zhang, Jian-Hui
    Cheng, Dong-Nian
    Wang, Bin-Qiang
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (12): : 3223 - 3239
  • [4] Inter-domain Identity-Based Proxy Re-encryption
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 332 - 347
  • [5] Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service
    Lupu, Radu
    Borcoci, Eugen
    Rasheed, Tinku
    INFORMATION SECURITY TECHNOLOGY FOR APPLICATIONS, 2012, 7161 : 162 - 175
  • [6] Identity-Based Authentication for Cloud Computing
    Li, Hongwei
    Dai, Yuanshun
    Tian, Ling
    Yang, Haomiao
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166
  • [7] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [8] Research on Beidou-based Inter-domain Identity Authentication for Mobile Object
    Yan Jie
    Lu Yu
    Liu Yunlong
    Chen Liyun
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 923 - 926
  • [9] An Identity-Based Authentication Scheme With Full Anonymity and Unlinkability for Mobile Edge Computing
    Tian, Junfeng
    Wang, Yiting
    Shen, Yue
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (13): : 23561 - 23576
  • [10] A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Jia, Xiaoying
    Luo, Min
    Choo, Kim-Kwang Raymond
    Li, Li
    He, Debiao
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 10108 - 10120