Identity authentication scheme based on identity-based encryption
In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encrypt...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-06-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00047 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530353411424256 |
---|---|
author | Ren-ji HUANG Xiao-ping WU Hong-cheng LI |
author_facet | Ren-ji HUANG Xiao-ping WU Hong-cheng LI |
author_sort | Ren-ji HUANG |
collection | DOAJ |
description | In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme. |
format | Article |
id | doaj-art-25e4faa2743d497e8230cd5e28410ed1 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2016-06-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-25e4faa2743d497e8230cd5e28410ed12025-01-15T03:04:38ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-06-012323759545855Identity authentication scheme based on identity-based encryptionRen-ji HUANGXiao-ping WUHong-cheng LIIn large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00047node identity authenticationidentity based cryptographkey escrowencryption |
spellingShingle | Ren-ji HUANG Xiao-ping WU Hong-cheng LI Identity authentication scheme based on identity-based encryption 网络与信息安全学报 node identity authentication identity based cryptograph key escrow encryption |
title | Identity authentication scheme based on identity-based encryption |
title_full | Identity authentication scheme based on identity-based encryption |
title_fullStr | Identity authentication scheme based on identity-based encryption |
title_full_unstemmed | Identity authentication scheme based on identity-based encryption |
title_short | Identity authentication scheme based on identity-based encryption |
title_sort | identity authentication scheme based on identity based encryption |
topic | node identity authentication identity based cryptograph key escrow encryption |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00047 |
work_keys_str_mv | AT renjihuang identityauthenticationschemebasedonidentitybasedencryption AT xiaopingwu identityauthenticationschemebasedonidentitybasedencryption AT hongchengli identityauthenticationschemebasedonidentitybasedencryption |