Identity authentication scheme based on identity-based encryption

In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encrypt...

Full description

Saved in:
Bibliographic Details
Main Authors: Ren-ji HUANG, Xiao-ping WU, Hong-cheng LI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-06-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00047
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530353411424256
author Ren-ji HUANG
Xiao-ping WU
Hong-cheng LI
author_facet Ren-ji HUANG
Xiao-ping WU
Hong-cheng LI
author_sort Ren-ji HUANG
collection DOAJ
description In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme.
format Article
id doaj-art-25e4faa2743d497e8230cd5e28410ed1
institution Kabale University
issn 2096-109X
language English
publishDate 2016-06-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-25e4faa2743d497e8230cd5e28410ed12025-01-15T03:04:38ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-06-012323759545855Identity authentication scheme based on identity-based encryptionRen-ji HUANGXiao-ping WUHong-cheng LIIn large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00047node identity authenticationidentity based cryptographkey escrowencryption
spellingShingle Ren-ji HUANG
Xiao-ping WU
Hong-cheng LI
Identity authentication scheme based on identity-based encryption
网络与信息安全学报
node identity authentication
identity based cryptograph
key escrow
encryption
title Identity authentication scheme based on identity-based encryption
title_full Identity authentication scheme based on identity-based encryption
title_fullStr Identity authentication scheme based on identity-based encryption
title_full_unstemmed Identity authentication scheme based on identity-based encryption
title_short Identity authentication scheme based on identity-based encryption
title_sort identity authentication scheme based on identity based encryption
topic node identity authentication
identity based cryptograph
key escrow
encryption
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00047
work_keys_str_mv AT renjihuang identityauthenticationschemebasedonidentitybasedencryption
AT xiaopingwu identityauthenticationschemebasedonidentitybasedencryption
AT hongchengli identityauthenticationschemebasedonidentitybasedencryption