Skip to main content
Log in

Trust authentication protocol on the Web

  • Web and Networking Technology
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust, authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Pirzada A A, McDonald C. Kerberos Assisted Authentication in Mobile Ad-hoc Networks. Castro EV, Ed.,The 27th conference on Australasian Computer Science, New Zealand, Dunedin; 2004,26: 41–46.

    Google Scholar 

  2. Blake-Wilson S, Nystrom M, Hopwood D,et al. Transport Layer Security (TLS) Extensions.IETF RFC 3546,June 2003,http://www.faqs.org/rfcs.

  3. Balfanz D, Smetters D K, Stewart P,et al. Talking to strangers: authentication in Ad-hoc wireless networks.The 9th Annual Network and Distributed System Security Symposium. San Diego: California, 2002.

  4. Bussard L, Roudier Y, Molva R. Untraceable Secret Credentials: Trust Establishment with Privacy.The Second IEEE Annual Conference on Pervasive Computing and Communications Workshops Orlando: Florida, 2004, 122–126.

  5. Corradi A, Montanari R, Tibaldi D. Context-Driven Adaptation of Trust Relationships in Pervasive Collaborative Environments.The 2005 Symposium on Applications and the Internet Workshops (SAINT-W'05). Trento: Italy, 2005. 178–181.

  6. Winsborough W H, Li N. Safety in Automated Trust Negotiation.In the Proceedings of IEEE Symposium on Security and Privacy. Berkeley, California: IEEE Computer Society Press, 2004. 147–160.

    Google Scholar 

  7. Winslett M, Yu T, Seamons K,et al. Trust Negotiation on the Web.IEEE Internet Computing, 2002,6(6): 30–37.

    Article  Google Scholar 

  8. Hess A, Jacobson J, Mills H,et al. Advanced, Client/server Authentication in TLS.In the Network and Distributed System Security Symposium. California: San Diego, 2002.

  9. Hess A, Holt J, Jacobson J,et al. Content-Triggered Trust Negotiation.ACM Transactions on Information and System Security, 2004,7(3): 428–456.

    Article  Google Scholar 

  10. Jarvis R. Selective Disclosure of Credential Content During Trust Negotiation. [Master thesis]. Hawaii: Department of Computer Science, Brigham Young University, 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Foundation item: Supported by the National Natural Science Fundation of China (60403027); Natural Science Fundation Of Hubei Province of China (2005ABA243)

Biography: GUO Ya-jun (1965-), male, Associate prefessor, research direction: include information security and cryptology, pervasive computing.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ya-jun, G., Fan, H. Trust authentication protocol on the Web. Wuhan Univ. J. Nat. Sci. 11, 253–255 (2006). https://doi.org/10.1007/BF02831742

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831742

Key words

CLC number

Navigation