What Can Identity-Based Cryptography Offer to Web Services?

被引:0
|
作者
Crampton, Jason [1 ]
Lim, Hoon Wei [1 ]
Paterson, Kenneth G. [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
Identity-based cryptography; web services; message-level security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web services are seen as the enabler of service-oriented computing, a promising next generation distributed computing technology. Independently, identity-based cryptography is emerging as a serious contender to more conventional certificate-based public key cryptography. However, the application of identity-based cryptography in web services appears largely unexplored. This paper sets out to examine how identity-based cryptography might be used to secure web services. We show that identity-based cryptography has some attractive properties which naturally suit the message-level security needed by web services.
引用
收藏
页码:26 / 36
页数:11
相关论文
共 50 条
  • [21] ARIBC: Online Reporting Based on Identity-Based Cryptography
    Goudosis, Athanasios
    Katsikas, Sokratis
    FUTURE INTERNET, 2021, 13 (02): : 1 - 17
  • [22] A Survey of Identity-based and Attribute-based Cryptography
    QI ZhenghuaYANG GengREN XunyiCollege of ComputerNanjing University of Posts and TelecommunicationsNanjing China
    南京邮电大学学报(自然科学版), 2010, 30 (01) : 11 - 17
  • [23] Electronic payment scheme using identity-based cryptography
    Nguyen, Son Thanh
    Rong, Chunming
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 330 - +
  • [24] EIBC: Enhanced Identity-Based Cryptography, a Conceptual Design
    Nicanfar, Hasen
    Leung, Victor C. M.
    2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 179 - 185
  • [25] RFID system security using identity-based cryptography
    Liang, Yan
    Rong, Chunming
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 482 - 489
  • [26] Toward hierarchical identity-based cryptography for tactical networks
    Matt, BJ
    MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 727 - 735
  • [27] Securing Mobile Phone Calls with Identity-Based Cryptography
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 210 - 222
  • [28] Identity-based Cryptography for Securing Mobile Phone Calls
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 365 - 370
  • [29] A Secure Email Encryption Proxy Based on Identity-based Cryptography
    Chen, Tieming
    Ma, Shilong
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 284 - 286
  • [30] Identity-Based Cryptography on Hidden-Order Groups
    Lin, Chanlgu
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2067 - 2071