An ID-based Proxy Authentication Protocol Supporting Public Key Infrastructure

نویسندگان

  • Shiuh-Pyng Shieh
  • Shih-I Huang
چکیده

The advantage of the ID-based authentication protocols over public-key based protocols is that authentication can be performed by simply knowing the identity of a party. Meanwhile, Public Key Infrastructure (PKI) provides a suite of excellent security and user management mechanisms that can be easily deployed to the Internet. In this paper, we present an ID-based proxy authentication protocol that can be interoperable with PKI. The proposed protocol leverages the management mechanisms of PKI while inheriting the nature of traditional ID-based protocols. In our protocol, a proxy certificate authority (PCA) is proposed to act as a bridge between an ID-based domain and the PKI domain. Authentication between two entities of different domains is thus made possible with the help of the proxy CA. The proposed protocol minimizes the message exchange overhead within an ID-based domain and supports both initial and subsequent authentication. In addition, a security analysis is presented to verify the strength and efficiency of the proposed protocol A Public Key Infrastructure (PKI)[1][6][7][10][15] is a key management environment for public key information of a public key cryptographic system [16]. A fundamental element of PKI is a data structure called a certificate, which is used to bind a specific identity to a specific public key and information on how the public key can be used. The most widely deployed certificate specification so far can be found in the International Telecommunications Union X.509 standard [6]. A Certificate Authority (CA) is a trusted third party that issues certificates to users within its administrative domain and provides status information about the certificates that it has issued. However, PKI does provide an excellent management mechanism for both users and certificates. Traditional ID-based domain users do not known the existence of other users and the expiration status of the other users, because the KIC does not record domain users’ information. However, with the help of PKI, it does provide domain user with a management protocol for querying the status of the other domain users.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Authentication Mechanism and Key Agreement Protocol for SIP Using Identity-based Cryptography

The Session Initiation Protocol (SIP) protocol is commonly used to establish Voice over IP (VoIP) calls. IETF SIP standards do not specify a secure authentication process thus allowing malicious parties to impersonate other parties or to charge calls to other parties. This paper proposes an extension to the SIP protocol that uses an identity-based authentication mechanism and key agreement prot...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Distributed SPKI/SDSI-Based Security for Networks of Devices

We describe a distributed security system based on SPKI/SDSI (Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure) for heterogeneously networked, diverse devices. All components of the system, for example, appliances, wearable gadgets, software agents, and users have associated trusted software proxies that either run on the appliance hardware or on a trusted computer. W...

متن کامل

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

Password-based authentication is still the most widelyused authentication mechanism, largely because of the ease with which it can be understood by end users and implemented. In this paper, we propose a security infrastructure for grid applications, in which users are authenticated using passwords. Our infrastructure allows users to perform single sign-on based only on passwords, without requir...

متن کامل

A Protocol for Secrecy and Authentication within Proxy-Based SPKI/SDSI Mobile Networks

Resource-constrained mobile devices are becoming increasingly popular within distributed networks, but introduce a weak point of security. Existing protocols for distributed mobile device networks, such as SPKI/SDSI, are emerging standards and lack built-in confidentiality, mutual authorisation and mutual authentication. Our research addresses the above-mentioned security limitations of an exis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002