Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments

被引:0
作者
Huo, Shi-Wei [1 ]
Luo, Chang-Yuan [1 ]
Xin, Hong-Zhi [1 ]
机构
[1] Informat Engn Univ, Elect Technol Inst, Zhengzhou 450004, Peoples R China
来源
INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II | 2011年 / 135卷
关键词
pervasive computing; inter-domain authentication; Identity-based cryptography; anonymity;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An Identity-based signature scheme is proposed based on additive elliptic curve group. The verification result of the signature is a constant with respect to the signer's identifier. Then an inter-domain authentication scheme is constructed by combining the proposed signature scheme. During the authentication, a user constructs the signature of timestamp as authentication proof, which realizes secure inter-domain authentication and user anonymity. It is showed that the proposed scheme has superiority in both security and efficiency, and is more suitable for pervasive computing.
引用
收藏
页码:314 / 320
页数:7
相关论文
共 5 条
[1]   Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks [J].
Cao, Xuefei ;
Zeng, Xingwen ;
Kou, Weidong ;
Hu, Liangbing .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (07) :3508-3517
[2]  
Peng Huaxi, 2006, J COMPUTERS, V29, P1271
[3]  
YAO L, 2010, J COMPUTERS MATH APP, V59, P811
[4]  
Zhu Hui, 2009, Journal on Communications, V30, P130
[5]   An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices [J].
Zhu, Robert W. ;
Yang, Guomin ;
Wong, Duncan S. .
THEORETICAL COMPUTER SCIENCE, 2007, 378 (02) :198-207