Skip to main content

ID-Based Authenticated Multi-group Keys Agreement Scheme for Computing Grid

  • Conference paper
Artificial Intelligence and Computational Intelligence (AICI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6320))

  • 1450 Accesses

Abstract

It has became a new active topic in grid security research fields that authentication and keys agreement between heterogeneous and dynamic grid nodes which belong to different trust domains. In this paper, an ID-based authenticated multi-group keys agreement scheme is proposed from bilinear pairings. Proposed scheme provides mutual authentication method for users that belong to different trust domains, and it employs shared password evolvement authentication mechanism that generates one-time passwords for every session. Moreover, our scheme overcomes limitations existed in some existing pairings-based authentication protocol, in which, special Hash functions are necessary. Proposed scheme can be used to generate session keys for large-scale distributed heterogeneous and dynamic grid resource.

This work was supported by the National Natural Science Foundation of China under Grant no.61075007 and no.61074077”; the Natural Science Foundation Research Plan of Shaanxi Province of China under Grant no.08JK382 and no.2009JM8004-5.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: Enabling scalable virtual Organizations. International Journal on Supercomputer Applications 15(3) (2001)

    Google Scholar 

  2. Xu, Z., Feng, B., Li, W.: Computing Grid Technology. Electronic Industry Press, Beijing (2004)

    Google Scholar 

  3. Jin, H., Zou, D., Chen, H., Sun, J., Wu, S.: Fault-Tolerant grid Architecture and Practice. Journal of Computer Science and Technology 18(4), 423–433 (2003)

    Article  Google Scholar 

  4. Chen, L., Lim, H.W., Mao, W.: User-friendly Grid Security Architecture and Protocols. In: Proceedings of the 13th International Workshop on Security Protocols, pp. 139–156 (2005)

    Google Scholar 

  5. Lim, H.W., Robshaw, M.J.B.: A Dynamic Key Infrastructure for GRID. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255–264. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Foster, I., Kesselman, C.: Globus: A metacomputing infrastructure toolkit. International Journal of Supercomputing Applications 11(2), 115–128 (1997)

    Article  Google Scholar 

  7. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 0196, pp. 47–53. Springer, Heidelberg (1984)

    Chapter  Google Scholar 

  8. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Lim, H.W., Robshaw, M.J.B.: On Identity-Based Cryptography and GRID Computing. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 474–477. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Mao, W.: An Identity-based Non-interactive Authentication Framework for Computational Grids. HP Lab, Technical Report HPL-2004-96 (June 2004), http://www.hpl.hp.com/techreports/2004/HPL-2004-96.pdf

  11. Lim, H.W., Paterson, K.G.: Identity-Based Cryptography for Grid Security. In: Proceedings of the 1st IEEE International Conference on e-Science and Grid Computing (e-Science 2005), Melbourne, Australia, pp. 395–404. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  12. Lim, H.W.: On the Application of Identity-Based Cryptography in Grid Security. PhD Thesis, University of London (2006)

    Google Scholar 

  13. Wang, L., Wu, C.: Identity Based Group Key Agreement in Multiple PKG Environment. WuHan University Journal of Natural Sciences 11(6), 1605–1608 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  14. Barreto, P.S.L.M., Kim, H.Y.: Fast hashing onto elliptic curves over fields of characteristic 3, Cryptology ePrint Archive, Report 2001/098 (2001), http://eprint.iacr.org/2001/098/

  15. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  16. Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  17. Li, L., Tsai, Y., Liu, R.: A Novel ID-based Authenticated Group Key Agreement Protocol Using Bilinear Pairings. In: WOCN 2008, pp. 1–5 (2008)

    Google Scholar 

  18. Wang, L., Wu, C.: Identity Based Group Key Agreement from Bilinear Pairing. WuHan University Journal of Natural Sciences 11(6), 1731–1735 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  19. Du, X., Wang, Y., Ge, J., Wang, Y.: An Improved ID-based Authenticated Group Key Agreement Scheme. Cryptology ePrint Archive, Report 2003/260 (2003), http://eprint.iacr.org/

  20. Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  21. Cheon, J.H., Kim, Y., Yoon, H.J.: A New ID-based Signature with Batch Verification. Cryptology ePrint Archive, Report 2004/131 (2004), http://eprint.iacr.org/

  22. Ateniesey, G., Steiner, M., Tsudik, G.: Authenticated group key agreement and friends. In: ACM Conference on Computer and Communications Security, pp. 17–26 (1998)

    Google Scholar 

  23. Okamoto, T., Harada, K., Okamoto, E.: ID-Based Key Agreement Schemes using General Hash Function from Pairing. In: The 2004 Workshop on Information Security Research (2004), http://www-kairo.csce.kyushu-u.ac.jp/WISR2004/presentation07.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, X., Wang, S. (2010). ID-Based Authenticated Multi-group Keys Agreement Scheme for Computing Grid. In: Wang, F.L., Deng, H., Gao, Y., Lei, J. (eds) Artificial Intelligence and Computational Intelligence. AICI 2010. Lecture Notes in Computer Science(), vol 6320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16527-6_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16527-6_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16526-9

  • Online ISBN: 978-3-642-16527-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics