A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing

被引:0
|
作者
Li, Ying [1 ]
Du, Liping [1 ]
Zhao, Guifen [1 ]
Feng, Fuwei [1 ]
机构
[1] Beijing Municipal Inst Sci & Technol Informat, Beijing Key Lab Network Cryptog Authenticat, 138 Xizhimenwai St, Beijing, Peoples R China
关键词
Cloud computing; Key agreement; Trusted third party;
D O I
10.1007/978-3-319-23862-3_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to protect authentication information of cloud users transmitted between RPs and OPs, a trusted third party-based key agreement scheme is proposed. In the scheme, encryption card and advanced cipher graph are used to generate one-time encryption key to encrypt one-time process key. The process key is used to encrypt interactive authentication information to prevent it from being leaked out. Analyses show that the scheme is efficient and safe.
引用
收藏
页码:407 / 412
页数:6
相关论文
共 50 条
  • [1] A Trusted Third Party-based Authentication Scheme in Cloud Computing
    Li, Ying
    Du, Li-Ping
    Zhao, Gui-Fen
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 850 - 856
  • [2] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
    Awaneesh Kumar Yadav
    An Braeken
    Manoj Misra
    The Journal of Supercomputing, 2023, 79 : 11261 - 11299
  • [3] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing
    Yadav, Awaneesh Kumar
    Braeken, An
    Misra, Manoj
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (10): : 11261 - 11299
  • [4] Protection of Identity Information in Cloud Computing without Trusted Third Party
    Ranchal, Rohit
    Bhargava, Bharat
    Ben Othmane, Lotfi
    Lilien, Leszek
    Kim, Anya
    Kang, Myong
    Linderman, Mark
    2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010, 2010, : 368 - 372
  • [5] A novel trusted third party based signcryption scheme
    Shamsher Ullah
    Xiang-Yang Li
    Zhang Lan
    Multimedia Tools and Applications, 2020, 79 : 22749 - 22769
  • [6] A novel trusted third party based signcryption scheme
    Ullah, Shamsher
    Li, Xiang-Yang
    Lan, Zhang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) : 22749 - 22769
  • [7] Authenticated public key distribution scheme without trusted third party
    Koo, JH
    Kim, BH
    Lee, DH
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 926 - 935
  • [8] An Autonomic SLA Monitoring Framework Managed by Trusted Third Party in the Cloud Computing
    Maarouf, Adil
    Mifrah, Youssef
    Marzouk, Abderrahim
    Haqiq, Abdelkrim
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2018, 8 (02) : 66 - 95
  • [9] Multiparty authentication services and key agreement protocols with semi-trusted third party
    Zheng, D
    Chen, KF
    You, JY
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 17 (06) : 749 - 756
  • [10] Multiparty authentication services and key agreement protocols with semi-trusted third party
    Dong Zheng
    Kefei Chen
    Jinyuan You
    Journal of Computer Science and Technology, 2002, 17 : 749 - 756