Research on Identity-Based Encryption Scheme for Grid Computing System

Article Preview

Abstract:

Grid system has secure requirements of confidential communication, data integrity and non-repudiation. According to the secure requirements for Grid service, the paper proposed an identity-based encryption scheme for Grid, which can solve a series of problem: the privacy of data transmission, validation of integrity of data, key update after long run time and non-repudiation. The scheme is constructed by bilinear paring on elliptic cures and its security can be reduced to the computational Bilinear Diffie-Hellman assumption. Finally, the authors analyses the security and efficiency of this scheme.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3156-3159

Citation:

Online since:

March 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Yang Qing, WANG Ruchuan, Research of adapting algorithm for WSRF model and adapting in Grid computing. Chinese Journal of Electronics, 2006, 15(3), 384~388.

Google Scholar

[2] LIU D.NING P,LI R.Establishing pairwise keys in distributed sensor networks.ACM Trans on Information and System Security.2005.8(1):41-47.

Google Scholar

[3] Shamir A. Identity based cryptosystems and signature schemes. In: Proceedings of the Advances in Cryptology-Crypto'84. Lecture Notes in Computer Science: 196. Springer-Verlag, 1984, 47~53.

DOI: 10.1007/3-540-39568-7_5

Google Scholar

[4] Boneh D., Franklin M., Identity-based encryption from the Weil pairing. In: Proceedings of the Advances in Cryptology-Crypto 2001. Lecture iNotes in Computer Science: 2139. Springer-Verlag, 2001, 213~229.

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[5] Feng Deng-Guo. Research on theory and approach of provable security. Journal of Software, 2005, 16(10): 1743~1756.

Google Scholar

[6] Boneh D., Gentry C., Lynn B., Shacham H., Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the Advances in Cryptology- EUROCRYPT'03. Lecture Notes in Computer Science: 2656. Springer-Verlag, 2003, 416~432.

DOI: 10.1007/3-540-39200-9_26

Google Scholar