A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing

被引:0
|
作者
Li, Ying [1 ]
Du, Liping [1 ]
Zhao, Guifen [1 ]
Feng, Fuwei [1 ]
机构
[1] Beijing Municipal Inst Sci & Technol Informat, Beijing Key Lab Network Cryptog Authenticat, 138 Xizhimenwai St, Beijing, Peoples R China
关键词
Cloud computing; Key agreement; Trusted third party;
D O I
10.1007/978-3-319-23862-3_40
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to protect authentication information of cloud users transmitted between RPs and OPs, a trusted third party-based key agreement scheme is proposed. In the scheme, encryption card and advanced cipher graph are used to generate one-time encryption key to encrypt one-time process key. The process key is used to encrypt interactive authentication information to prevent it from being leaked out. Analyses show that the scheme is efficient and safe.
引用
收藏
页码:407 / 412
页数:6
相关论文
共 50 条
  • [21] IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Party-based Location-based Services Systems
    Ashraf, Muhammad Usman
    Jambi, Kamal M.
    Qayyum, Rida
    Ejaz, Hina
    Ilyas, Iqra
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (07) : 604 - 617
  • [22] A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
    Wu, Fan
    Xu, Lili
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 189 - 200
  • [23] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01): : 497 - 522
  • [24] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Mariem Bouchaala
    Cherif Ghazel
    Leila Azouz Saidane
    The Journal of Supercomputing, 2022, 78 : 497 - 522
  • [25] Provably secure biometric-based user authentication and key agreement scheme in cloud computing
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4103 - 4119
  • [26] Scalable threshold scheme without a trusted third party
    Li, B
    Zhang, SS
    Chen, KF
    PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 853 - 858
  • [27] Reputation-based Trust Management in Cloud using a Trusted Third Party
    Aarthy, D. K.
    Aarthi, M.
    Farhath, Afritha K.
    Lakshana, S.
    Lavanya, V
    2017 THIRD INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING & MANAGEMENT (ICONSTEM), 2017, : 216 - 221
  • [28] Secured Document Management through A Third Party Auditor Scheme in Cloud Computing
    Parasuraman, Kumar
    Srinivasababu, P.
    Angelin, S. Rajula
    Devi, T. Arumuga Maria
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATION AND COMPUTATIONAL ENGINEERING (ICECCE), 2014, : 109 - 118
  • [29] A Trusted Third Party Based Secure Authentication Scheme of E-Commerce
    Zhang Longjun
    Zou Tao
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 590 - 594
  • [30] A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party
    Mishra, Dheerendra
    Dharminder, Dharminder
    Yadav, Preeti
    Rao, Y. Sreenivasa
    Vijayakumar, Pandi
    Kumar, Neeraj
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55