A simple user authentication scheme for grid computing

被引:0
|
作者
Department of Computer Science and Engineering, Shanghai Jiao Tong University, No.800, Dongchuan Rd., Minghang District, Shanghai, 200240, China [1 ]
机构
来源
Int. J. Netw. Secur. | 2008年 / 2卷 / 202-206期
关键词
Geometry; -; Cryptography; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
The security issue has become an important concern of grid computing. To prevent the grid resources from being illegally visited, the strong mutual authentication is needed for user and server. In this paper, based on the elliptic curve cryptosystem, we would like to propose an efficient user authentication scheme for grid computing. The proposed scheme only requires a one-way hash func-tion and server private key, which makes it more simple.
引用
收藏
相关论文
共 50 条
  • [31] User authentication scheme for sensor networks
    Wang Xiaoming
    Yao Guoxiang
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [32] A scheme for authentication and authorization in a grid application
    Hu, HP
    Yao, HB
    19th International Conference on Advanced Information Networking and Applications, Vol 1, Proceedings: AINA 2005, 2005, : 383 - 387
  • [33] A Secure Remote User Authentication Scheme
    Park, Ji-Hye
    Yim, Seong Jun
    Chang, Jik Hyun
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 368 - 373
  • [34] Cryptanalysis of a remote user authentication scheme
    Wang, Bangju
    Zhang, Huanguo
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1699 - 1701
  • [35] Security Analysis of Blockchain-based User Authentication for Smart Grid Edge Computing Infrastructure
    Lee, Hakjun
    Ryu, Jihyeon
    Lee, Youngsook
    Won, Dongho
    PROCEEDINGS OF THE 2021 15TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2021), 2021,
  • [36] An improvement of Hwang-Lee-Tang's simple remote user authentication scheme
    Yoon, EJ
    Ryu, EK
    Yoo, KY
    COMPUTERS & SECURITY, 2005, 24 (01) : 50 - 56
  • [37] A Simple Attack on a Recently Introduced Hash-Based Secure User Authentication Scheme
    Kim, Minho
    Koc, Cetin Kaya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 157 - 160
  • [38] User authentication scheme based on undeniable signature scheme
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (08): : 146 - 147
  • [39] Multilevel Authentication Scheme for Cloud Computing
    Adam, Sara Alfatih
    Yousif, Adil
    Bashir, Mohammed Bakri
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (09): : 205 - 212
  • [40] Authentication Scheme in Cloud Computing: A Review
    Meena, Sunita
    Syal, Rupali
    PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,