Abstract
It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust, authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.
Similar content being viewed by others
References
Pirzada A A, McDonald C. Kerberos Assisted Authentication in Mobile Ad-hoc Networks. Castro EV, Ed.,The 27th conference on Australasian Computer Science, New Zealand, Dunedin; 2004,26: 41–46.
Blake-Wilson S, Nystrom M, Hopwood D,et al. Transport Layer Security (TLS) Extensions.IETF RFC 3546,June 2003,http://www.faqs.org/rfcs.
Balfanz D, Smetters D K, Stewart P,et al. Talking to strangers: authentication in Ad-hoc wireless networks.The 9th Annual Network and Distributed System Security Symposium. San Diego: California, 2002.
Bussard L, Roudier Y, Molva R. Untraceable Secret Credentials: Trust Establishment with Privacy.The Second IEEE Annual Conference on Pervasive Computing and Communications Workshops Orlando: Florida, 2004, 122–126.
Corradi A, Montanari R, Tibaldi D. Context-Driven Adaptation of Trust Relationships in Pervasive Collaborative Environments.The 2005 Symposium on Applications and the Internet Workshops (SAINT-W'05). Trento: Italy, 2005. 178–181.
Winsborough W H, Li N. Safety in Automated Trust Negotiation.In the Proceedings of IEEE Symposium on Security and Privacy. Berkeley, California: IEEE Computer Society Press, 2004. 147–160.
Winslett M, Yu T, Seamons K,et al. Trust Negotiation on the Web.IEEE Internet Computing, 2002,6(6): 30–37.
Hess A, Jacobson J, Mills H,et al. Advanced, Client/server Authentication in TLS.In the Network and Distributed System Security Symposium. California: San Diego, 2002.
Hess A, Holt J, Jacobson J,et al. Content-Triggered Trust Negotiation.ACM Transactions on Information and System Security, 2004,7(3): 428–456.
Jarvis R. Selective Disclosure of Credential Content During Trust Negotiation. [Master thesis]. Hawaii: Department of Computer Science, Brigham Young University, 2003.
Author information
Authors and Affiliations
Additional information
Foundation item: Supported by the National Natural Science Fundation of China (60403027); Natural Science Fundation Of Hubei Province of China (2005ABA243)
Biography: GUO Ya-jun (1965-), male, Associate prefessor, research direction: include information security and cryptology, pervasive computing.
Rights and permissions
About this article
Cite this article
Ya-jun, G., Fan, H. Trust authentication protocol on the Web. Wuhan Univ. J. Nat. Sci. 11, 253–255 (2006). https://doi.org/10.1007/BF02831742
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831742