期刊文献+

CPK-based grid authentication:a step forward 被引量:4

CPK-based grid authentication: a step forward
原文传递
导出
摘要 Effective grid authentication plays a critical role in grid security, which has been recognized as a key issue in the designing and extension of grid technologies. At present, public key infrastructure (PKI) has been widely applied for grid authentication, and this article proposes a novel grid authentication mechanism, which is based on combined public key (CPK) employing elliptic curve cryptography (ECC). The designing structure of the new grid authentication mechanism and its implementation procedure are described in details. Property analysis of the new mechanism is also made in comparison with that of the globus security infrastructure (GSI) authentication, which leads to the conclusion that CPK-based grid authentication, may be applied as an optimized approach towards efficient and effective grid authentication. Effective grid authentication plays a critical role in grid security, which has been recognized as a key issue in the designing and extension of grid technologies. At present, public key infrastructure (PKI) has been widely applied for grid authentication, and this article proposes a novel grid authentication mechanism, which is based on combined public key (CPK) employing elliptic curve cryptography (ECC). The designing structure of the new grid authentication mechanism and its implementation procedure are described in details. Property analysis of the new mechanism is also made in comparison with that of the globus security infrastructure (GSI) authentication, which leads to the conclusion that CPK-based grid authentication, may be applied as an optimized approach towards efficient and effective grid authentication.
作者 WANG Hai-yan
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第1期26-31,共6页 中国邮电高校学报(英文版)
关键词 grid authentication CPK SECURITY grid authentication, CPK, security
  • 相关文献

参考文献2

二级参考文献26

  • 1Ong H,Proceedings of Eurocrypt'90,1994年,432页
  • 2ESCHENAUER L,GL IGOR V D.A key-management scheme for distributed sensor net works[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security,Nov 18-22,2002,Washington,DC,USA.New York,NY,USA:ACM Press,2002:41 -47.
  • 3DI PIETRO R,MANCINI L V,MEI A.Random key assignment for secure wireless sensor networks[C]//Proceedings of 1st ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03),Oct 31,2003,Fairfax,VA,USA.New York,NY,USA:ACM Press,2003:62-71.
  • 4CHAN H,PERRIG A,SONG D.Random key predistribution schemes for sensor networks[C]//Proceedings of IEEE Symposium on Research in Security and Privacy,May 11 -14,2003,Berkeley,CA,USA.Piscataway,NJ,USA:IEEE,2003:197-213.
  • 5LAUTER K.The advantages of elliptic curve cryptography for wireless security[J].IEEE Wireless Communications,2004,11(1):62-67.
  • 6DU W,DENG J,HAN Y S,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.
  • 7BLOM R.An optimal class of symmetric key generation systems[C]//Proceedings of Advances in Cryptology(EUROCRYPT 84),Apr 9-11,1985,Paris,France.Berlin,Germany,Springer,1985:335-338.
  • 8LIU D,NING P.Location-based pairwise key establishments for static sensor networks[C]//Proceedings of 1st ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03),Oct 31,2003,Fairfax,VA,USA.New York,NY,USA:ACM Press,2003:72-82.
  • 9GANESAN P,VENUGOPALAN R,PEDDABACHAGARI P.Analyzing and modeling encryption overhead for sensor network nodes[C]//Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications,Sep 19,2003,San Diego,CA,USA.New York,NY,USA:ACM Press,2003:151-159.
  • 10GAUBATZ G,KAPS J,SUNAR B.Public keys cryptography in sensor networks-revisited[C] // Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS),Aug 6,2004,Heidelberg,Germany.Heidelberg,Germany:Springer-Verlag,2004:2-18.

共引文献10

同被引文献20

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部