An Improved Kerberos Intra-domain Authentication Protocol Based-On Certificateless Public-Key Cryptography

被引:0
|
作者
Wang Juan [1 ]
Cao Man-cheng [1 ]
Fang Yuan-kang [1 ]
机构
[1] Chizhou Coll, Chizhou, Anhui, Peoples R China
关键词
Kerberos; Intra-domain Authentication; Security Attributes; Certificateless Public key cryptography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper sums up some improvements in Kerberos intra-domain authentication protocol included in many domestic and foreign literatures. By analyzing the limitations of those improvement schemes, an improvement in Kerberos intra-domain authentication protocol based on certificateless public-key thought is proposed. The analysis shows that the improvement proposal can overcome some defects in the original Kerberos intra-domain authentication protocol, such as the key escrow problem and network intermediaries attack, etc. Moreover, the improvement also meets the demand of security proposed by key agreement protocol, which has a certain security and perspective of application in the process of network identity authentication.
引用
收藏
页码:489 / 496
页数:8
相关论文
共 50 条
  • [41] Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
    Beckmann, Nathan
    Potkonjak, Miodrag
    INFORMATION HIDING, 2009, 5806 : 206 - +
  • [42] Authenticated Key Agreement protocol for Virtual Private Network based on Certificateless Cryptography
    Eldewahi, Abeer
    Basheir, Eihab
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONICS ENGINEERING (ICCEEE), 2013, : 269 - 273
  • [43] A Security Architecture for Wireless Sensor Networks Based-on Public Key Cryptography
    Yao, Jianbo
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3648 - 3650
  • [44] A new public-key cryptography based on chaotic attractors of neural networks
    Liu, NS
    Guo, DH
    PROGRESS IN INTELLIGENCE COMPUTATION & APPLICATIONS, 2005, : 293 - 300
  • [45] Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
    Zhang, Xin
    Chen, Kejiang
    Ding, Jinyang
    Yang, Yuqi
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3148 - 3163
  • [46] Transferable Quantum Cheque Scheme Based on Quantum Public-Key Cryptography
    Chen, Hui-Min
    Jia, Heng-Yue
    Wu, Xia
    Wang, Xiu-Li
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (08)
  • [47] Transferable Quantum Cheque Scheme Based on Quantum Public-Key Cryptography
    Hui-Min Chen
    Heng-Yue Jia
    Xia Wu
    Xiu-Li Wang
    International Journal of Theoretical Physics, 61
  • [48] FPGA design for algebraic tori-based Public-Key Cryptography
    Fan, Junfeng
    Batina, Lejla
    Sakiyama, Kazuo
    Verbauwhede, Ingrid
    2008 DESIGN, AUTOMATION AND TEST IN EUROPE, VOLS 1-3, 2008, : 1134 - 1139
  • [49] A Software Watermarking Method Based on Public-Key Cryptography and Graph Coloring
    Jiang, Zetao
    Zhong, Rubing
    Zheng, Bina
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 433 - 437
  • [50] Image encryption based on nonlinear encryption system and public-key cryptography
    Zhao, Tieyu
    Ran, Qiwen
    Chi, Yingying
    OPTICS COMMUNICATIONS, 2015, 338 : 64 - 72