An Improved Kerberos Intra-domain Authentication Protocol Based-On Certificateless Public-Key Cryptography

被引:0
|
作者
Wang Juan [1 ]
Cao Man-cheng [1 ]
Fang Yuan-kang [1 ]
机构
[1] Chizhou Coll, Chizhou, Anhui, Peoples R China
关键词
Kerberos; Intra-domain Authentication; Security Attributes; Certificateless Public key cryptography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper sums up some improvements in Kerberos intra-domain authentication protocol included in many domestic and foreign literatures. By analyzing the limitations of those improvement schemes, an improvement in Kerberos intra-domain authentication protocol based on certificateless public-key thought is proposed. The analysis shows that the improvement proposal can overcome some defects in the original Kerberos intra-domain authentication protocol, such as the key escrow problem and network intermediaries attack, etc. Moreover, the improvement also meets the demand of security proposed by key agreement protocol, which has a certain security and perspective of application in the process of network identity authentication.
引用
收藏
页码:489 / 496
页数:8
相关论文
共 50 条
  • [31] A public-key based watermarking for color image authentication
    Byun, SC
    Lee, IL
    Shin, TH
    Ahn, BH
    IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I AND II, PROCEEDINGS, 2002, : 593 - 596
  • [32] Lattice-based certificateless public-key encryption in the standard model
    Reza Sepahi
    Ron Steinfeld
    Josef Pieprzyk
    International Journal of Information Security, 2014, 13 : 315 - 333
  • [33] Traitor tracing using identity based public-key cryptography
    National Key Laboratory of ISN, Xidian University, Xi'an 710071, China
    不详
    Chin J Electron, 2006, 4 (687-691):
  • [34] PASSWORD AUTHENTICATION BASED ON PUBLIC-KEY DISTRIBUTION CRYPTOSYSTEM
    HARN, L
    HUANG, D
    LAIH, CS
    PROCEEDINGS : FIFTH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, 1989, : 332 - 338
  • [35] Lattice-based certificateless public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 315 - 333
  • [36] Public-key cryptography based on bounded quantum reference frames
    Ioannou, Lawrence M.
    Mosca, Michele
    THEORETICAL COMPUTER SCIENCE, 2014, 560 : 33 - 45
  • [37] Traitor tracing using identity based public-key cryptography
    Lv Xixiang
    Yang Bo
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04): : 687 - 691
  • [38] Ternary quantum public-key cryptography based on qubit rotation
    Yuqi Wang
    Geng Chen
    Liya Jian
    Yi Zhou
    Shiming Liu
    Quantum Information Processing, 21
  • [39] Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions
    Roettger, Eric
    Williams, Hugh C.
    FUNDAMENTA INFORMATICAE, 2012, 114 (3-4) : 325 - 344
  • [40] Ternary quantum public-key cryptography based on qubit rotation
    Wang, Yuqi
    Chen, Geng
    Jian, Liya
    Zhou, Yi
    Liu, Shiming
    QUANTUM INFORMATION PROCESSING, 2022, 21 (06)