An Identity-based Non-interactive Authentication Framework for Computational Grids

نویسنده

  • Wenbo Mao
چکیده

We examine the authentication framework for Globus Security Infrastructure (GSI, the current grid security standard) and identify a weakness of poor scalability due to heavy interactions between a user-side client and many resource contribution sites. We propose an alternative authentication framework for GSI using authenticated session keys which are shared between two parties without any interactions between them. Our proposal is enabled by an emerging cryptographic technique from the bilinear pairing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EFL Teachers’ Identity Construction through a Reflection Consciousness-Raising Interactive Workshop

As part of a large-scale project, the current qualitative study investigated the possible contribution of a consciousness-raising interactive workshop (as a form of professional development activity) to 30) 22 female and 8 male) Iranian EFL teachers’ professional identity construction. Thirty Iranian EFL teachers were asked to write two reflective journals (one individually and one collectively...

متن کامل

A non-interactive deniable authentication scheme in the standard model

the standard model Bin Wang ,Qing Zhao and Ke Dai Information Engineering College of Yangzhou University No.196 West HuaYang Road, Yangzhou City, Jiangsu Province, P.R.China E-mail: [email protected] Abstract: Deniable authentication protocols enable a sender to authenticate a message to a receiver such that the receiver is unable to prove the identity of the sender to a third party. In contrast...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

A non-interactive deniable authentication scheme based on designated verifier proofs

A non-interactive deniable authentication scheme based on designated verifier proofs Bin Wang Information Engineering College of Yangzhou University No.36 Middle JiangYang Road, Yangzhou City, Jiangsu Province, P.R.China Tel: 086-0514-82220820 E-mail:[email protected] Abstract: A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prov...

متن کامل

Efficient and Non-Malleable Proofs of Plaintext

We describe efficient protocols for non-malleable (interactive) proofs of plaintext knowledge for the RSA, Rabin, Paillier, and El Gamal encryption schemes. We also highlight some important applications of these protocols: – Chosen-ciphertext-secure, interactive encryption. In settings where both parties are on-line, an interactive encryption protocol may be used. We construct chosen-ciphertext...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004