期刊文献+

一种基于身份的多信任域网格认证模型 被引量:32

An Identity-Based Authentication Model for Multi-Domain Grids
在线阅读 下载PDF
导出
摘要 分析了现有的网格认证框架中存在的问题,提出了一种基于身份的多信任域网格认证模型.该模型以基于身份的PK I为基础,避免了基于传统PK I的认证框架的诸多缺点.同时,该模型提供了跨信任域的双向实体认证功能.模拟试验表明,该认证模型比基于传统PK I的认证框架更轻量、更高效.而且由于该模型可以在多信任域的环境下工作,故而比W M ao提出的只能在单一信任域中工作的认证框架更符合网格认证的实际需要. We consider the efficient authentication for Grids. We analyze the problems of existing Grid authentication frameworks, and propose an identity-based authentication model for multi-domain Grids. Our model is based on the identity-based PKI so as to overcome the problem of low efficiency and high cost posed by traditional certificate based PKI. Moreover, our model supports cross-domain mutual entity authentication, which is necessary to common Grids consisting of distinct domains. Through simulation testing, it is shown that our model is more efficient and more lightweight than those frameworks based on traditional PKI. It is also shown that due to supporting cross-domain authentication ,our model is more suitable for Grids than framework proposed by W. Mao,which can only work in a single domain.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第4期577-582,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.60273027No.60503014No.60373039)
关键词 网格 认证 基于身份的公钥密码体制 签密 Grid authentication identity-based public key cryptography signcryption
  • 相关文献

参考文献16

  • 1R Butler, V Welch, D Engert, I Foster, S Tuecke, J Volmer, C Kesselman. A national-scale authentication infrastructure [ J ]. IEEE Computer, 2000,33 ( 12 ) : 60 -66.
  • 2I Foster, C Kesselman,G Tsudik, S Tuecke. A security architecture for computational GRID [ A ]. In Proceedings of the 5th ACM Conference on Computer and Communications Security [ C ]. New York: ACM press,1998, 83 - 92.
  • 3M Thompson, A Essiari, S Mudumbai. Certificate-based authorization policy in a PKI environment [ J ]. ACM Transactions on Information and System Security,2003,6(4) :566 -588.
  • 4N Nagaratnam, P Janson, J Dayka, A Nadalin, F Siebenlist,V Welch, I Foster, S Tuecke. The security architecture for open GRID services[OL]. http://www. cs.virginia.edu/-humphrey/ogsa-sec-wg/OGSA-SecArch-v1-07192002. pdf. July ,2002.
  • 5P Gutmann. PKI: it's not dead, just resting [ J ]. IEEE Computer,2002,35(8) :41 -49.
  • 6J Linn, M Branchaud. An examination of asserted PKI issues and proposed alternatives[ A]. In Proceedings of the 3rd Annual PKI R & D Workshop [ C ]. Gaithers-burg : NIST ,2004.
  • 7W Mao. An identity-based non-interactive authentication framework for computational grids [ R ]. Hewlett-Packard Laboratories,technical report HPL-2004-096,2004.
  • 8A Shamir. Identity-based cryptosystems and signature schemes [A]. In Advances in Cryptology-Crypto'84[C]. Berlin: Springer-Verlag, 1984.47 - 53.
  • 9D Boneh, M Franklin. Identity-based encryption from the Weil pairing [ A ]. In Advances in Cryptology-CRYPTO 2001 [ C ]. Berlin: Springer-Berlag ,2001. 213-219.
  • 10J Malone-Lee. Identity-based signcryption [ OL ]. http://eprint.iacr. org/2002/098.pdf.July,2002.

同被引文献166

引证文献32

二级引证文献179

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部