Abstract
It has became a new active topic in grid security research fields that authentication and keys agreement between heterogeneous and dynamic grid nodes which belong to different trust domains. In this paper, an ID-based authenticated multi-group keys agreement scheme is proposed from bilinear pairings. Proposed scheme provides mutual authentication method for users that belong to different trust domains, and it employs shared password evolvement authentication mechanism that generates one-time passwords for every session. Moreover, our scheme overcomes limitations existed in some existing pairings-based authentication protocol, in which, special Hash functions are necessary. Proposed scheme can be used to generate session keys for large-scale distributed heterogeneous and dynamic grid resource.
This work was supported by the National Natural Science Foundation of China under Grant no.61075007 and no.61074077”; the Natural Science Foundation Research Plan of Shaanxi Province of China under Grant no.08JK382 and no.2009JM8004-5.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: Enabling scalable virtual Organizations. International Journal on Supercomputer Applications 15(3) (2001)
Xu, Z., Feng, B., Li, W.: Computing Grid Technology. Electronic Industry Press, Beijing (2004)
Jin, H., Zou, D., Chen, H., Sun, J., Wu, S.: Fault-Tolerant grid Architecture and Practice. Journal of Computer Science and Technology 18(4), 423–433 (2003)
Chen, L., Lim, H.W., Mao, W.: User-friendly Grid Security Architecture and Protocols. In: Proceedings of the 13th International Workshop on Security Protocols, pp. 139–156 (2005)
Lim, H.W., Robshaw, M.J.B.: A Dynamic Key Infrastructure for GRID. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005)
Foster, I., Kesselman, C.: Globus: A metacomputing infrastructure toolkit. International Journal of Supercomputing Applications 11(2), 115–128 (1997)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 0196, pp. 47–53. Springer, Heidelberg (1984)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Lim, H.W., Robshaw, M.J.B.: On Identity-Based Cryptography and GRID Computing. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 474–477. Springer, Heidelberg (2004)
Mao, W.: An Identity-based Non-interactive Authentication Framework for Computational Grids. HP Lab, Technical Report HPL-2004-96 (June 2004), http://www.hpl.hp.com/techreports/2004/HPL-2004-96.pdf
Lim, H.W., Paterson, K.G.: Identity-Based Cryptography for Grid Security. In: Proceedings of the 1st IEEE International Conference on e-Science and Grid Computing (e-Science 2005), Melbourne, Australia, pp. 395–404. IEEE Computer Society Press, Los Alamitos (2005)
Lim, H.W.: On the Application of Identity-Based Cryptography in Grid Security. PhD Thesis, University of London (2006)
Wang, L., Wu, C.: Identity Based Group Key Agreement in Multiple PKG Environment. WuHan University Journal of Natural Sciences 11(6), 1605–1608 (2006)
Barreto, P.S.L.M., Kim, H.Y.: Fast hashing onto elliptic curves over fields of characteristic 3, Cryptology ePrint Archive, Report 2001/098 (2001), http://eprint.iacr.org/2001/098/
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)
Li, L., Tsai, Y., Liu, R.: A Novel ID-based Authenticated Group Key Agreement Protocol Using Bilinear Pairings. In: WOCN 2008, pp. 1–5 (2008)
Wang, L., Wu, C.: Identity Based Group Key Agreement from Bilinear Pairing. WuHan University Journal of Natural Sciences 11(6), 1731–1735 (2006)
Du, X., Wang, Y., Ge, J., Wang, Y.: An Improved ID-based Authenticated Group Key Agreement Scheme. Cryptology ePrint Archive, Report 2003/260 (2003), http://eprint.iacr.org/
Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003)
Cheon, J.H., Kim, Y., Yoon, H.J.: A New ID-based Signature with Batch Verification. Cryptology ePrint Archive, Report 2004/131 (2004), http://eprint.iacr.org/
Ateniesey, G., Steiner, M., Tsudik, G.: Authenticated group key agreement and friends. In: ACM Conference on Computer and Communications Security, pp. 17–26 (1998)
Okamoto, T., Harada, K., Okamoto, E.: ID-Based Key Agreement Schemes using General Hash Function from Pairing. In: The 2004 Workshop on Information Security Research (2004), http://www-kairo.csce.kyushu-u.ac.jp/WISR2004/presentation07.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, X., Wang, S. (2010). ID-Based Authenticated Multi-group Keys Agreement Scheme for Computing Grid. In: Wang, F.L., Deng, H., Gao, Y., Lei, J. (eds) Artificial Intelligence and Computational Intelligence. AICI 2010. Lecture Notes in Computer Science(), vol 6320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16527-6_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-16527-6_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16526-9
Online ISBN: 978-3-642-16527-6
eBook Packages: Computer ScienceComputer Science (R0)