Identity-based cross-domain authentication scheme in pervasive computing environments

An identity-based signature scheme was proposed based on additive elliptic curve group.The verification result of the signature was a constant with respect to the signer’s identity.The scheme could guarantee user anonymity in the process of cross-domain authentication and avoided the pairing operati...

Full description

Saved in:
Bibliographic Details
Main Authors: LUO Chang-yuan, HUO Shi-wei, XING Hong-zhi
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74421257/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537761197162496
author LUO Chang-yuan
HUO Shi-wei
XING Hong-zhi
author_facet LUO Chang-yuan
HUO Shi-wei
XING Hong-zhi
author_sort LUO Chang-yuan
collection DOAJ
description An identity-based signature scheme was proposed based on additive elliptic curve group.The verification result of the signature was a constant with respect to the signer’s identity.The scheme could guarantee user anonymity in the process of cross-domain authentication and avoided the pairing operation.Then a cross-domain authentication scheme was constructed by combining the proposed signature scheme.During the authentication,a user constructed the signature of timestamp as authentication proof,which realized secure cross-domain authentication and user anonymity.It is shown that the proposed scheme has superiority in both security and efficiency,and is more suitable for pervasive computing.
format Article
id doaj-art-065a45c320eb4d8ea8c648753eb50fa8
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-065a45c320eb4d8ea8c648753eb50fa82025-01-14T08:23:32ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013211111574421257Identity-based cross-domain authentication scheme in pervasive computing environmentsLUO Chang-yuanHUO Shi-weiXING Hong-zhiAn identity-based signature scheme was proposed based on additive elliptic curve group.The verification result of the signature was a constant with respect to the signer’s identity.The scheme could guarantee user anonymity in the process of cross-domain authentication and avoided the pairing operation.Then a cross-domain authentication scheme was constructed by combining the proposed signature scheme.During the authentication,a user constructed the signature of timestamp as authentication proof,which realized secure cross-domain authentication and user anonymity.It is shown that the proposed scheme has superiority in both security and efficiency,and is more suitable for pervasive computing.http://www.joconline.com.cn/zh/article/74421257/pervasive computingcross-domain authenticationidentity-based cryptographyanonymity
spellingShingle LUO Chang-yuan
HUO Shi-wei
XING Hong-zhi
Identity-based cross-domain authentication scheme in pervasive computing environments
Tongxin xuebao
pervasive computing
cross-domain authentication
identity-based cryptography
anonymity
title Identity-based cross-domain authentication scheme in pervasive computing environments
title_full Identity-based cross-domain authentication scheme in pervasive computing environments
title_fullStr Identity-based cross-domain authentication scheme in pervasive computing environments
title_full_unstemmed Identity-based cross-domain authentication scheme in pervasive computing environments
title_short Identity-based cross-domain authentication scheme in pervasive computing environments
title_sort identity based cross domain authentication scheme in pervasive computing environments
topic pervasive computing
cross-domain authentication
identity-based cryptography
anonymity
url http://www.joconline.com.cn/zh/article/74421257/
work_keys_str_mv AT luochangyuan identitybasedcrossdomainauthenticationschemeinpervasivecomputingenvironments
AT huoshiwei identitybasedcrossdomainauthenticationschemeinpervasivecomputingenvironments
AT xinghongzhi identitybasedcrossdomainauthenticationschemeinpervasivecomputingenvironments