메뉴 건너뛰기




Volumn , Issue , 2012, Pages 271-278

Provably secure single sign-on scheme in distributed systems and networks

Author keywords

Authentication; Distributed systems and networks; Information security; Single sign on; Soundness

Indexed keywords

ACCESS PERMISSIONS; AUTHENTICATED KEY EXCHANGE; AUTHENTICATION SCHEME; CREDENTIAL-BASED; DISTRIBUTED SYSTEMS; MULTIPLE COMPUTERS; PROVABLY SECURE; REMOTE EDUCATION; SECURITY MODEL; SESSION KEY EXCHANGE; SINGLE SIGN ON; SOUNDNESS; USER ANONYMITY;

EID: 84868090556     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2012.228     Document Type: Conference Paper
Times cited : (14)

References (23)
  • 1
    • 0037862948 scopus 로고    scopus 로고
    • Distributing Internet Services to the Networks Edge
    • Jun.
    • A. C. Weaver and M. W. Condtry, "Distributing Internet Services to The Networks Edge", IEEE Trans. Ind. Electron., vol. 50, no. 3, pp. 404-411, Jun. 2003.
    • (2003) IEEE Trans. Ind. Electron. , vol.50 , Issue.3 , pp. 404-411
    • Weaver, A.C.1    Condtry, M.W.2
  • 2
    • 79956280962 scopus 로고    scopus 로고
    • JXTA-OVERLAY: A P2P Platform for Distributed, Collaborative and Ubiquitous Computing
    • Oct.
    • L. Barolli and F. Xhafa, "JXTA-OVERLAY: A P2P Platform for Distributed, Collaborative and Ubiquitous Computing", IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2163-2172, Oct. 2010.
    • (2010) IEEE Trans. Ind. Electron. , vol.58 , Issue.6 , pp. 2163-2172
    • Barolli, L.1    Xhafa, F.2
  • 3
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • Nov.
    • L. Lamport, "Password Authentication with Insecure Communication", Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 6
    • 84893564604 scopus 로고    scopus 로고
    • Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
    • ePrint Archive, Report 2012/107
    • G. Wang, J. Yu, and Q. Xie, "Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks", IACR Cryptology ePrint Archive, Report 2012/107, http://eprint.iacr.org/2012/107.
    • IACR Cryptology
    • Wang, G.1    Yu, J.2    Xie, Q.3
  • 7
    • 0034225062 scopus 로고    scopus 로고
    • User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks
    • W. B. Lee and C. C. Chang, "User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks", Computer Systems Science and Engineering, vol. 15, no. 4, pp. 113-116, 2000.
    • (2000) Computer Systems Science and Engineering , vol.15 , Issue.4 , pp. 113-116
    • Lee, W.B.1    Chang, C.C.2
  • 8
    • 1542335490 scopus 로고    scopus 로고
    • Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks
    • T.-S. Wu and C.-L. Hsu, "Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks", Computers and Security, vol. 23, no. 2, pp. 120-125, 2004.
    • (2004) Computers and Security , vol.23 , Issue.2 , pp. 120-125
    • Wu, T.-S.1    Hsu, C.-L.2
  • 9
    • 10644225185 scopus 로고    scopus 로고
    • New Efficient User Identification and Key Distribution Scheme Providing Enhanced Security
    • Y. Yang, S.Wang, F. Bao, J.Wang, and R. H. Deng, "New Efficient User Identification and Key Distribution Scheme Providing Enhanced Security", Computers and Security, vol. 23, no. 8, pp. 697-704, 2004.
    • (2004) Computers and Security , vol.23 , Issue.8 , pp. 697-704
    • Yang, Y.1    Wang, S.2    Bao, F.3    Wang, J.4    Deng, R.H.5
  • 10
    • 33748125161 scopus 로고    scopus 로고
    • A Secure Identification and Key Agreement Protocol with User Anonymity (sika)
    • K. V. Mangipudi and R. S. Katti, "A Secure Identification and Key Agreement Protocol with User Anonymity (sika)", Computers and Security, vol. 25, no. 6, pp. 420-425, 2006.
    • (2006) Computers and Security , vol.25 , Issue.6 , pp. 420-425
    • Mangipudi, K.V.1    Katti, R.S.2
  • 11
    • 56949092341 scopus 로고    scopus 로고
    • A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks
    • C.-L. Hsu and Y.-H. Chuang, "A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks", Inf. Sci., vol. 179, no. 4, pp. 422-429, 2009.
    • (2009) Inf. Sci. , vol.179 , Issue.4 , pp. 422-429
    • Hsu, C.-L.1    Chuang, Y.-H.2
  • 12
    • 80053654561 scopus 로고    scopus 로고
    • A Secure Single Sign-on Mechanism for Distributed Computer Networks
    • C.-C. Chang and C.-Y. Lee, "A Secure Single Sign-on Mechanism for Distributed Computer Networks", IEEE Transactions on Industrial Electronics, vol. 59, no. 1, pp. 629-637, 2012.
    • (2012) IEEE Transactions on Industrial Electronics , vol.59 , Issue.1 , pp. 629-637
    • Chang, C.-C.1    Lee, C.-Y.2
  • 13
    • 12344258539 scopus 로고
    • Efficient Signature Generation by Smart Cards
    • C.P. Schnorr, "Efficient Signature Generation by Smart Cards", J. Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
    • (1991) J. Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 14
    • 0024611659 scopus 로고
    • The Knowledge Complexity of Interactive Proof-Systems
    • Feb.
    • S. Goldwasser, S. Micali, and C. Rackoff, "The Knowledge Complexity of Interactive Proof-Systems", SIAM J. Computing, vol. 18, no. 1, pp. 186-208, Feb. 1989.
    • (1989) SIAM J. Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 16
    • 84885890418 scopus 로고    scopus 로고
    • A Generic Construction of Dynamic Single Sign-on with Strong Security
    • Proc. of SecureComm'10, Springer
    • J. Han, Y. Mu, W. Susilo, and J. Yan, "A Generic Construction of Dynamic Single Sign-on with Strong Security," in Proc. of SecureComm'10, pp. 181-198, LNICS 50, Springer, 2010.
    • (2010) LNICS , vol.50 , pp. 181-198
    • Han, J.1    Mu, Y.2    Susilo, W.3    Yan, J.4
  • 17
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • M. Bellare and P. Rogaway, "Entity Authentication and Key Distribution", CRYPTO, pp. 232-249, 1993.
    • (1993) CRYPTO , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 18
    • 0000537828 scopus 로고
    • Efficient Identification and Signatures for Smart Cards
    • C.P. Schnorr, "Efficient Identification and Signatures for Smart Cards", CRYPTO ,pp. 239-252, 1989.
    • (1989) CRYPTO , pp. 239-252
    • Schnorr, C.P.1
  • 19
    • 84937408891 scopus 로고    scopus 로고
    • GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
    • M. Bellare and A. Palacio, "GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks", CRYPTO, pp. 162-177, 2002.
    • (2002) CRYPTO , pp. 162-177
    • Bellare, M.1    Palacio, A.2
  • 20
    • 84927727752 scopus 로고    scopus 로고
    • Security Proofs for Signature Schemes
    • D. Pointcheval, J. Stern, "Security Proofs for Signature Schemes", EUROCRYPT, pp. 387-398, 1996.
    • (1996) EUROCRYPT , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 21
    • 0000901529 scopus 로고    scopus 로고
    • Security Arguments for Digital Signatures and Blind Signatures
    • D. Pointcheval, J. Stern, "Security Arguments for Digital Signatures and Blind Signatures", J.Cryptology, vol.13, no.3, pp. 361-369, 2000.
    • (2000) J.Cryptology , vol.13 , Issue.3 , pp. 361-369
    • Pointcheval, D.1    Stern, J.2
  • 22
    • 0021555016 scopus 로고
    • A "Paradoxical" Solution to the Signature Problem
    • Extended Abstract
    • S. Goldwasser, S. Micali, and L. Ronald, "A "Paradoxical" Solution to the Signature Problem (Extended Abstract)", FOCS, pp. 441-448, 1984.
    • (1984) FOCS , pp. 441-448
    • Goldwasser, S.1    Micali, S.2    Ronald, L.3
  • 23
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • S. Goldwasser, S. Micali, and R. L. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks", SIAM J. Comput., vol. 17, no. 2, pp. 281-308, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.