A simple user authentication scheme for grid computing

被引:0
|
作者
Department of Computer Science and Engineering, Shanghai Jiao Tong University, No.800, Dongchuan Rd., Minghang District, Shanghai, 200240, China [1 ]
机构
来源
Int. J. Netw. Secur. | 2008年 / 2卷 / 202-206期
关键词
Geometry; -; Cryptography; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for user and server. In this paper, based on the elliptic curve cryptosystem, we would like to propose an efficient user authentication scheme for grid computing. The proposed scheme only requires a one-way hash func-tion and server private key, which makes it more simple.
引用
收藏
相关论文
共 50 条
  • [21] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [22] User authentication in mobile computing environment
    Takubo, A
    Ishikawa, M
    Watanabe, T
    Soga, M
    Mizuno, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1997, E80A (07) : 1288 - 1298
  • [23] A simple authentication encryption scheme
    Mazumder, Rashed
    Miyaji, Atsuko
    Su, Chunhua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):
  • [24] A Simple Authentication Scheme for Clouds
    Huszti, Andrea
    Olah, Norbert
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 565 - 569
  • [25] An Improved of Enhancements of a User Authentication Scheme
    Hwang, Min-Shiang
    Li, Hou-Wen
    Yang, Cheng-Ying
    International Journal of Network Security, 2023, 25 (03) : 508 - 514
  • [26] Robust remote user authentication scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR BROADBAND AND MOBILE NETWORKS, 2004, 3090 : 935 - 942
  • [28] A lightweight authentication scheme with user untraceability
    Kuo-Hui Yeh
    Frontiers of Information Technology & Electronic Engineering, 2015, 16 : 259 - 271
  • [29] Cryptanalysis of the User Authentication Scheme with Anonymity
    Jeon, Woongryul
    Kim, Jeeyeon
    Nam, Junghyun
    Lee, Youngsook
    Won, Dongho
    FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 285 - +
  • [30] A Hybrid Graphical User Authentication Scheme
    Saeed, Swaleha
    Umar, M. Sarosh
    2015 COMMUNICATION, CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2015, : 411 - 415