HyCPK: Securing Identity Authentication in ubiquitous computing

被引:2
作者
Xu, Guangquan [1 ]
Ren, Yan [1 ]
Zhang, Gaoxu [1 ]
Liu, Bin [1 ]
Li, Xiaohong [1 ]
Feng, Zhiyong [1 ]
机构
[1] Tianjin Univ, Sch Comp Sci & Technol, Tianjin, Peoples R China
来源
IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS | 2015年
基金
中国国家自然科学基金;
关键词
Collusion Attack; Combined Public Key (CPK); ubiquitous computing; Single-double Hybrid Matrix; Web Service; USER AUTHENTICATION; SCHEME; ENHANCEMENT; IMPROVEMENT; SYSTEM;
D O I
10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.56
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identity authentication (IA) is vital in ubiquitous computing systems, one of which is web service system; however most current IA schemes and technologies are facing various kinds of attacks and large-scale certification problem. To address this problem, this paper proposes the HyCPK, an improved CPK algorithm based on a single-double hybrid matrix. In this algorithm, the key management center produces a basic key matrix and an assistant key matrix simultaneously, and the former is used to calculate the keys of web services, while both are used to calculate the keys of users. Moreover, CPK identity is redefined to be composed of user identity and the corresponding validity date, which enables the validation processes to be tackled in a more convenient way. Contrasting with the existing CPK schema, the proposed algorithm can solve the problem of large-scale certification and resist three main collusion attacks, and hence the security performance is improved.
引用
收藏
页码:239 / 246
页数:8
相关论文
共 21 条
[1]  
Chen H.P., 2007, CHINA INFORM SECURIT, V29, P47
[2]   The Research of Authentication Management System based on CPK Identification Authentication [J].
Dong Fang ;
Li Qin-wei ;
Jing Li-cui .
2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, :970-973
[3]   Sharing Cloud Services: User Authentication for Social Enhancement of Home Networking [J].
Grzonkowski, Slawomir ;
Corcoran, Peter M. .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2011, 57 (03) :1424-1432
[4]  
JOHNSON D, 2000, 9934 CORR U WAT DEP
[5]  
Nan X., 2006, IDENTITY AUTHENTICAT, P57
[6]  
Nan X.H., 2006, CHINA INFORM SECURIT, V28, P12
[7]  
Nan X.H., 2008, CHINA INFORM SECURIT, V30, P21
[8]  
Nan X. H., 2012, CHINA INFORM SECURIT, V2012, P49
[9]  
Nan X. H., 2013, CHINA INFORM SECURIT, V2013, P39
[10]  
Nan X. H., 2011, NETWORK COMPUTER SEC, V2011, P4