What Can Identity-Based Cryptography Offer to Web Services?

被引:0
|
作者
Crampton, Jason [1 ]
Lim, Hoon Wei [1 ]
Paterson, Kenneth G. [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
Identity-based cryptography; web services; message-level security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web services are seen as the enabler of service-oriented computing, a promising next generation distributed computing technology. Independently, identity-based cryptography is emerging as a serious contender to more conventional certificate-based public key cryptography. However, the application of identity-based cryptography in web services appears largely unexplored. This paper sets out to examine how identity-based cryptography might be used to secure web services. We show that identity-based cryptography has some attractive properties which naturally suit the message-level security needed by web services.
引用
收藏
页码:26 / 36
页数:11
相关论文
共 50 条
  • [31] RFID System Security Using Identity-Based Cryptography
    Chen, Youqin
    Chen, Zhide
    Xu, Li
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 460 - 464
  • [32] E-passport EAC scheme based on Identity-Based Cryptography
    Li, C. H.
    Zhang, X. F.
    Jin, H.
    Xiang, W.
    INFORMATION PROCESSING LETTERS, 2010, 111 (01) : 26 - 30
  • [33] A secret classified label control model based on the identity-based cryptography
    Wu, Zhijun
    Tian, Shan
    Li, Wen
    Yue, Meng
    Wang, Jian
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 96 - 101
  • [34] Securing Topology Control in SDWSNs Using Identity-Based Cryptography
    Wang, Rui
    Liu, Donglan
    Liu, Xin
    Chen, Jianfei
    Ma, Lei
    Wang, Yong
    Zhang, Hao
    Yu, Hao
    Su, Bing
    Zhang, Fangzhe
    Sun, Lili
    JOURNAL OF SENSORS, 2023, 2023
  • [35] Design, implementation, and performance evaluation of identity-based cryptography in ONOS
    Lam, JunHuy
    Lee, Sang-Gon
    Lee, Hoon-Jae
    Oktian, Yustus Eko
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (01)
  • [36] Achieving Identity-Based Cryptography in a Personal Digital Assistant Device
    Martinez-Ramos, Luis
    Lopez-Garcia, L.
    Rodriguez-Henriquez, F.
    JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2011, 9 (03) : 324 - 334
  • [37] Biometric Identity-Based Cryptography for e-Government Environment
    Aljeaid, Dania
    Ma, Xiaoqi
    Langensiepen, Caroline
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 581 - 588
  • [38] Datagram Transport Layer Security Protocol with Identity-Based Cryptography
    School of Computer, National University of Defense Technology, Changsha
    410073, China
    Ruan Jian Xue Bao, (90-97):
  • [39] SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
    Mihai-Lica, Pura
    Victor-Valeriu, Patriciu
    Ion, Bica
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 135 - 139
  • [40] Body Sensor Network Security: An Identity-Based Cryptography Approach
    Tan, Chiu C.
    Wang, Haodong
    Zhong, Sheng
    Li, Qun
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 148 - 153