What Can Identity-Based Cryptography Offer to Web Services?

被引:0
|
作者
Crampton, Jason [1 ]
Lim, Hoon Wei [1 ]
Paterson, Kenneth G. [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
Identity-based cryptography; web services; message-level security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web services are seen as the enabler of service-oriented computing, a promising next generation distributed computing technology. Independently, identity-based cryptography is emerging as a serious contender to more conventional certificate-based public key cryptography. However, the application of identity-based cryptography in web services appears largely unexplored. This paper sets out to examine how identity-based cryptography might be used to secure web services. We show that identity-based cryptography has some attractive properties which naturally suit the message-level security needed by web services.
引用
收藏
页码:26 / 36
页数:11
相关论文
共 50 条
  • [41] Securing wireless sensor networks: an identity-based cryptography approach
    Szczechowiak, Piotr
    Scott, Michael
    Collier, Martin
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2010, 8 (3-4) : 182 - 192
  • [42] Distributed Private-Key Generators for Identity-Based Cryptography
    Kate, Aniket
    Goldberg, Ian
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 436 - 453
  • [43] Cross-platform Identity-based Cryptography using WebAssembly
    Vecsi, Adam
    Bagossy, Attila
    Petho, Attila
    INFOCOMMUNICATIONS JOURNAL, 2019, 11 (04): : 31 - 38
  • [44] Improved TLS Handshake Protocols Using Identity-based Cryptography
    Peng, Changyan
    Zhang, Quan
    Tang, Chaojing
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 135 - 139
  • [45] An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security
    Vincent O.R.
    Okediran T.M.
    Abayomi-Alli A.A.
    Adeniran O.J.
    SN Computer Science, 2020, 1 (2)
  • [46] Key refreshing in identity-based cryptography and its applications in MANETs
    Balfe, Shane
    Boklan, Kent D.
    Klagsbrun, Zev
    Paterson, Kenneth G.
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2924 - +
  • [47] Applicability of Identity-Based Cryptography for Disruption-Tolerant Networking
    Asokan, N.
    Kostiainen, Kari
    Ginzboorg, Philip
    Ott, Joerg
    Luo, Cheng
    MOBIOPP'07 - PROCEEDINGS OF THE FIRST INTERNATIONAL MOBISYS WORKSHOP ON MOBILE OPPORTUNISTIC NETWORKING, 2007, : 52 - 56
  • [48] Towards operating identity-based NFC services
    Laukkanen, Mikko
    2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 92 - +
  • [49] Design of Secure and Independent Controllable Email System Based on Identity-Based Cryptography
    Xuan, Jiaxing
    Wang, Dong
    Li, Zhiqi
    Zhang, Shuxian
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 217 - 222
  • [50] WHAT SERVICES SADAG CAN OFFER YOUR PATIENTS
    Matare, Elizabeth
    SOUTH AFRICAN JOURNAL OF PSYCHIATRY, 2010, 16 (03) : 92 - 92