메뉴 건너뛰기




Volumn 7, Issue 3, 2008, Pages 342-347

Efficient certificateless authentication and key agreement (CL-AK) for grid computing

Author keywords

Certificateless AK (CL AK); Certificateless public key cryptography (CL PKC); Grid computing; Key agreement (AK); Mutual authentication

Indexed keywords

AUTHENTICATION AND KEY AGREEMENT PROTOCOLS; AUTHENTICATION AND KEY AGREEMENTS; CERTIFICATELESS; CERTIFICATELESS PUBLIC KEY CRYPTOGRAPHY; GRID SECURITY INFRASTRUCTURE; KEY AGREEMENT; MUTUAL AUTHENTICATION; PUBLIC-KEY INFRASTRUCTURE;

EID: 70350453453     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (36)

References (22)
  • 1
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless public key cryptography," Proceedings of ASI- ACRYPT 2003
    • Springer- Verlag
    • S. S. Al-Riyami and K. G. Paterson, "Certificateless public key cryptography," Proceedings of ASI- ACRYPT 2003, LNCS 2894, pp. 452-473, Springer- Verlag, 2003.
    • (2003) LNCS 2894 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 2
    • 33744818520 scopus 로고    scopus 로고
    • Certificateless public key cryptography
    • Report 2003/126
    • S. S. Al-Riyami and K. G. Paterson, "Cer- tificateless public key cryptography," Cryptology ePrint Archive, Report 2003/126, 2003. (http://eprint.iacr.org/)
    • (2003) Cryptology ePrint Archive
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 3
    • 24144438230 scopus 로고    scopus 로고
    • CBE from CLPKE: A generic construction and efficient schemes
    • LNCS 3386
    • S. S. Al-Riyami and K. G. Paterson. "CBE from CLPKE: A generic construction and efficient schemes," Proceedings PKC 2005, LNCS 3386, pp. 398-415, Springer-Verlag, Berlin, 2005.
    • (2005) Proceedings PKC , pp. 398-415
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 4
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithms for pairing-based cryptosystems
    • 2442 Springer-Verlag
    • P. Barreto, H. Y. Kim, B. Bynn and M. Scott, "Efficient algorithms for pairing-based cryptosystems," Proceedings of CRYPTO 2002, LNCS 2442 Springer-Verlag, pp. 354- 368 2002.
    • (2002) Proceedings of CRYPTO
    • Barreto, P.1    Kim, H.Y.2    Bynn, B.3    Scott, M.4
  • 5
    • 35048900981 scopus 로고    scopus 로고
    • On the selection of pairing-friendly groups
    • LNCS 3006
    • P. Barreto, B. Lynn, and M. Scott, "On the selection of pairing-friendly groups," Proceedings of SAC 2003, LNCS 3006, pp. 17-25, Springer-Verlag, 2004
    • (2004) Proceedings of SAC 2003 , pp. 17-25
    • Barreto, P.1    Lynn, B.2    Scott, M.3
  • 6
    • 84949221411 scopus 로고    scopus 로고
    • Authenticated Diffie-Hellman key agreement protocols
    • LNCS 1556 Springer- Verlag
    • S. Blake-Wilson and A. Menezes, "Authenticated Diffie-Hellman key agreement protocols," Proceedings of SAC 1998, LNCS 1556 Springer- Verlag, pp. 339-361, 1999.
    • (1999) Proceedings of SAC 1998 , pp. 339-361
    • Blake-Wilson, S.1    Menezes, A.2
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from theWeil pairing
    • Springer-Verlag LNCS 2139
    • D. Boneh and M. Franklin, "Identity-based encryption from theWeil pairing," Proceedings of CRYPTO 2001, Springer-Verlag LNCS 2139, pp. 213-229, 2001.
    • (2001) Proceedings of CRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 10
    • 33646180371 scopus 로고    scopus 로고
    • On session key construction in provably secure protocols
    • Springer-Verlag LNCS 3715
    • K. K. R. Choo, C. Boyd, and Y. Hitchcock, "On session key construction in provably secure protocols," Proceedings of MYCRYPT 2005, Springer-Verlag LNCS 3715, pp. 116-131,2005.
    • (2005) Proceedings of MYCRYPT , pp. 116-131
    • Choo, K.K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 12
    • 0036471031 scopus 로고    scopus 로고
    • The Grid: A new infrastructure for 21st century science
    • I. Foster, "The Grid: A new infrastructure for 21st century science," Physics Today, vol. 55, no. 2, pp. 42-47, 2002.
    • (2002) Physics Today , vol.55 , Issue.2 , pp. 42-47
    • Foster, I.1
  • 13
    • 84874954194 scopus 로고    scopus 로고
    • The Grid 2: Blueprint for a new computing infrastructure
    • I. Foster, and C. Kesselman, The Grid 2: Blueprint for a new computing infrastructure, Elsevier, San Francisco, 2004.
    • (2004) Elsevier, San Francisco
    • Foster, I.1    Kesselman, C.2
  • 15
    • 2442621633 scopus 로고    scopus 로고
    • The SSL Protocol
    • Version 3.0, INTERNET-DRAFT
    • A. O. Freier, P. Karlton, and P. C. Kocher, The SSL Protocol, Version 3.0, INTERNET-DRAFT,1996.
    • (1996)
    • Freier, A.O.1    Karlton, P.2    Kocher, P.C.3
  • 16
    • 0041291986 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure Certificate And Certificate Revocation List (CRL) Profile
    • (IETF), RFC
    • R. Housley, W. Polk, W. Ford, and D. Solo Internet X.509 Public Key Infrastructure Certificate And Certificate Revocation List (CRL) Profile, The Internet Engineering Task Force (IETF), RFC 2002.
    • (2002) The Internet Engineering Task Force
    • Housley, R.1    Polk, W.2    Ford, W.3    Solo, D.4
  • 17
    • 84874985069 scopus 로고
    • ITU-T, Recommendation X.509 the Directory- Au- thentication Framework, International Telecommunication Union, Geneva, Switzerland
    • ITU-T, Recommendation X.509 the Directory-Au- thentication Framework, International Telecommunication Union, Geneva, Switzerland. 1993.
    • (1993)
  • 18
    • 24644510922 scopus 로고    scopus 로고
    • An Identity-Based Non-Interactive Authentication Framework For Computational Grids
    • HPL-TR-2004-96
    • W. Mao, An Identity-Based Non-Interactive Authentication Framework For Computational Grids, HP Laboratories Bristol, HPL-TR-2004-96, 2004.
    • (2004) HP Laboratories Bristol
    • Mao, W.1
  • 19
    • 84944878354 scopus 로고    scopus 로고
    • Hand- book of Applied Cryptography
    • CRC Press
    • A. Menezes, P. v. Oorschot, and S. Vanstone, Hand-book of Applied Cryptography, CRC Press, 1997.
    • (1997)
    • Menezes, A.1    Oorschot, P.2    Vanstone, S.3
  • 20
    • 0032069870 scopus 로고    scopus 로고
    • Key control in key agreement protocols
    • C. Mitchell, M. Ward, and P. Wilson, "Key control in key agreement protocols," Electronics Letters, vol. 34, no. 10, pp. 980-981, 1998.
    • (1998) Electronics Letters , vol.34 , Issue.10 , pp. 980-981
    • Mitchell, C.1    Ward, M.2    Wilson, P.3
  • 21
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • LNCS 196
    • A. Shamir, "Identity-based cryptosystems and signature schemes," Proceedings of CRYPTO 1984, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
    • (1984) Proceedings of CRYPTO 1984 , pp. 47-53
    • Shamir, A.1
  • 22
    • 33645584388 scopus 로고    scopus 로고
    • Generic construction of certificateless encryption
    • Springer-Verlag LNCS 3043
    • D. H. Yum, and P. J. Lee, "Generic construction of certificateless encryption," Proceedings of ICCSA 2004, Springer-Verlag LNCS 3043, pp. 802-8112004.
    • (2004) Proceedings of ICCSA 2004 , pp. 802-811
    • Yum, D.H.1    Lee, P.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.