A Bran-New Cross-Domain Authentication Model Based on Lattice

Article Preview

Abstract:

A bran-new lattice based cross-domain model is proposed to solve the shortcomings of the existing authentication model. Firstly, using the lattice theory, this model builds credit-domain alliance and user alliance on the two dimensional coordinates to avoid the abuse of centralized plans. Secondly, it uses the superiority thought of the existing authentication system to strengthen the integrity of the model. Finally, the detailed work flow, formula, domain disposal, extended algorithm, and identity-based Stealth transport protocols of the new model are drafted. It ensures the user’s identity information and privacy. After the certification and analysis, this model proved to have a good Practical character and an extremely large extension space.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

847-853

Citation:

Online since:

June 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] SHEN Hai-bo, HONG Fan. Analysis of Cross-domain SSO Authentication for Web Services, Application Research of Computers, 2006, 23(2), pp: 116-118.

Google Scholar

[2] MENG Fan-rong, XIE Hong-xia, WANG Ru-chuan, XIA Shi-xiong. Research of single sign-on in grid, Journal on Communications, 2007, 28(11). pp: 81-86.

Google Scholar

[3] LI Geng-sheng. the design and implementation of unified security authentication envirment, Northwestern polytechnical university, (2006).

Google Scholar

[4] Rolf Oppliger, Microsoft . NET Passport and identity management eSECURITY Technologies, Information Security Technical Report[Z]. Vol. 9, No. 1, 2004, pp: 26-33.

DOI: 10.1016/s1363-4127(04)00013-5

Google Scholar

[5] Liberty Alliance Project. Liberty Architecture Overview[Z]. (2003).

Google Scholar

[6] Geng Suyu, Qu Wanlin, Wang Hangping. Discrete math tutorial[M]. Peking University Press, (2002).

Google Scholar

[7] PENG Haitao, CAO Zhenfu, ZHANG Sunyan. Comparison of Identity-based with Certificate-based Public Key Cryptosystem, Computer Engineering, 2004, 30p( B12), pp: 268-270.

Google Scholar

[8] D. Boneh, M. Franklin. Identity-based encryption from the weilpairing. In: Proceedings of the Cryptology Crypto 2001, pp: 213-229.

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[9] PENG Hua-Xi. An Identity-Based Authentication Model for Multi-Domain, Chinese Journal of Computers, 2006. 8, 29(8), pp: 1272-1281.

Google Scholar

[10] ZHANG Qiu-yu , ZHANG Qi-kun, YUAN Zhan-ting. Cross-domain Authentication alliance protocol based on lattice. Computer Application. 2007, 27(4): 835-837.

Google Scholar