DocumentCode
1613435
Title
An Identity-Based Authentication Scheme in Cloud Computing
Author
Zhang, Zhi-Hua ; Xue-Feng, Jiang ; Li, Jian-Jun ; Jiang, Wei
Author_Institution
Tobacco Zhejiang Ind. Co..Ltd., Hangzhou, China
fYear
2012
Firstpage
984
Lastpage
986
Abstract
Cloud computing is a hot topic of current research, and identity-based authentication is important in many applications scenarios of e-business based on cloud computing, in these e-business scenarios users should prove the user´s legacy, and the enterprise needs to determine whether the user has the right popedom, so this paper presents a identity-based authentication scheme for this applications, and this scheme avoids the issues how to revocation public key certificate and the escrow problem of key, and then the security of the scheme is analyzed, at last the communication process of the identity-based authentication scheme is described.
Keywords
authorisation; cloud computing; electronic commerce; public key cryptography; cloud computing; communication process; e-business scenarios; identity-based authentication scheme; key escrow problem; revocation public key certificate; Industrial control; Bilinear map; CDHP; Cloud computing; identity-based authentication;
fLanguage
English
Publisher
ieee
Conference_Titel
Industrial Control and Electronics Engineering (ICICEE), 2012 International Conference on
Conference_Location
Xi´an
Print_ISBN
978-1-4673-1450-3
Type
conf
DOI
10.1109/ICICEE.2012.261
Filename
6322550
Link To Document