A Quasi IBE Identity Authentication Scheme in a Cloud Computing Environment

Article Preview

Abstract:

This paper draws on the principle of identity-based public key encryption (IBE) system algorithm. A suitable Identity authentication scheme for cloud computing environment is proposed. Security analysis of the scheme is given. The proposed scheme using the bidirectional signature between Client and cloud server has solved the safety verification audit, and realized identity authentication in cloud computing. We provide end-to-end authentication instead of trusted third party, which solve the problem of Key Escrow and improve the efficiency of the management of the identity authentication.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

837-840

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Xianghao Nan, CPK logo certification [M]. Beijing National Defenses Industry Press, 2006: 47-50.

Google Scholar

[2] Liang Hu, Jianfeng Chu, Haiqun Lin. Key management mechanism of IBE system [J]. Journal of Computers, 2009, 32 (3): 543-551.

Google Scholar

[3] Bing Zeng, Yu Yang, Yunfei Cao, IBE technology research [J]. Information security and confidentiality of communications, (2011).

Google Scholar

[4] Benoit Libert, Jean-Jacques Quisquater, Identity based undeniable signatures/ LectureNotes in Computer Science 2964. Berlin: Springer-Verlag, 2004: (1997).

Google Scholar

[5] Haicheng Yan, Hui Li, Wen Zhang. An end-to-end key management scheme under IBE mechanism [J]. Computer Engineering and Applications, 2012, 48(1): 116-119.

Google Scholar

[6] Liang Hu, Zheli Liu, Tao Sun. Summary of safety research of identity-based cryptography[J]. Computer Research and Development, 2009, 46(9).

Google Scholar

[7] Weimin Si. Analysis and comparison of several IBE security key distribution protocol [J]. Computer Science, 2008, 35(11): 79-81.

Google Scholar

[8] Huang Ru-fen, Nong Qiang, Huang Zhen-jie. Provably secure certificate-based blind signature[J]. Application Research of Computers, 2012, 29(12): 4262- 4266.

Google Scholar

[9] Yu Xing-jie, Gao Neng, Jiang Wei-yu, Research on the Authentication in Cloud Computing, 2012[C]. Benjing: the 27th National Computer Security Symposium, 71-74.

Google Scholar

[10] Boneh D, Franklin M. Identity-based encryption from Weil pairing[C]/LNCS 2139: Advances in Cryptology-Crypto'O1. Berlin: Springer- Verlag, 2001: 213-229.

DOI: 10.1007/3-540-44647-8_13

Google Scholar