An Identity-based Non-interactive Authentication Framework for Computational Grids
نویسنده
چکیده
We examine the authentication framework for Globus Security Infrastructure (GSI, the current grid security standard) and identify a weakness of poor scalability due to heavy interactions between a user-side client and many resource contribution sites. We propose an alternative authentication framework for GSI using authenticated session keys which are shared between two parties without any interactions between them. Our proposal is enabled by an emerging cryptographic technique from the bilinear pairing.
منابع مشابه
EFL Teachers’ Identity Construction through a Reflection Consciousness-Raising Interactive Workshop
As part of a large-scale project, the current qualitative study investigated the possible contribution of a consciousness-raising interactive workshop (as a form of professional development activity) to 30) 22 female and 8 male) Iranian EFL teachers’ professional identity construction. Thirty Iranian EFL teachers were asked to write two reflective journals (one individually and one collectively...
متن کاملA non-interactive deniable authentication scheme in the standard model
the standard model Bin Wang ,Qing Zhao and Ke Dai Information Engineering College of Yangzhou University No.196 West HuaYang Road, Yangzhou City, Jiangsu Province, P.R.China E-mail: [email protected] Abstract: Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA non-interactive deniable authentication scheme based on designated verifier proofs
A non-interactive deniable authentication scheme based on designated verifier proofs Bin Wang Information Engineering College of Yangzhou University No.36 Middle JiangYang Road, Yangzhou City, Jiangsu Province, P.R.China Tel: 086-0514-82220820 E-mail:[email protected] Abstract: A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prov...
متن کاملEfficient and Non-Malleable Proofs of Plaintext
We describe efficient protocols for non-malleable (interactive) proofs of plaintext knowledge for the RSA, Rabin, Paillier, and El Gamal encryption schemes. We also highlight some important applications of these protocols: – Chosen-ciphertext-secure, interactive encryption. In settings where both parties are on-line, an interactive encryption protocol may be used. We construct chosen-ciphertext...
متن کامل