An Improved ID Based Entitled Verifier Cryptography for Grid Systems
نویسنده
چکیده
Identity based cryptography offers an extremely bright alternative to public key based cryptography in the grid computing scenario. A majority of the current security architecture for grid systems use public key infrastructure based security to authenticate grid members and to secure resource allocation to them. In this paper we present identity based cryptography for the grid architecture which, not only supports the standard services like single sign on, authorization, mutual authentication and delegation but also signatures meant for a particular entitled verifier. The scheme is highly efficient as compared to the previously proposed schemes as it uses the pairing operations very judiciously. Identitybased cryptography significantly reduces the system complexity and the cost for establishing and managing the public key authentication framework known as Public Key Infrastructure or in short commonly referred to as PKI.
منابع مشابه
An efficient non-delegatable identity based strong designated verifier signature scheme
Designated verifier signatures are intended to a specific and unique designated verifier, who is the only one person to check their validity. This paper proposes a new efficient non-delegatable strong designated verifier signature scheme based on identity based cryptography. We analyze the security of the scheme and compare its computational aspects with the other ID-SDVS schemes existing in li...
متن کاملImprovement on Sui et al.'s Separable and Anonymous Key Issuing Protocol in ID-based Cryptosystem
To avoid the need of secure channel in ID-based public key systems (ID-PKC), Sui et al. proposed a separable and anonymous key issuing protocol in [1]. Recently, R. Gangishetti et al. showed that Sui et al.'s key issuing protocol suffers from the stolen verifier attack and incompetency of KGCs in [2]. However, R.Gangishetti et al. did not give any solutions to resist these attacks. In this pape...
متن کاملAn ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow
A server-aided verification signature, some complex computation for verification of a signature is carried out by a server. Thus, it is very suitable for low-power computation devices. In this paper, by combining ID-based cryptography and server-aided verification signature, we propose an ID-based server-aided verification signature scheme, and give two SA-Verifying ways to realize server-aided...
متن کاملSecurity and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
With the rapid development of wireless communication technologies, mobile networks will enable users to use personal mobile devices to access various network information services at anytime and anyplace. Recently, Lu et al. proposed a dynamic ID based mutual authentication and key agreement scheme using elliptic curve cryptography (ECC) which attempts to support better security properties and r...
متن کاملFaceCerts
The availability of high-end printers has rendered forging most personal ID documents (passports, visas) a relatively simple task and significantly raised the costs of printing such documents by the issuers. Proposed electronic systems for personal ID verification need to connect to a remote database and retrieve a stored photo for the comparison with the image on the ID. FaceCerts is an off-li...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009