2014 IEEE 17th International Conference on Computational Science and Engineering 2014
DOI: 10.1109/cse.2014.320
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhanced Anonymous Remote User Authentication and Key Agreement for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Neither KGC nor the user can generate a complete private key independently, which solves the key escrow problem in the identity-based cryptosystem. Literature [16,17] proposed a cloud user identity authentication scheme based on certificateless password system, but there was no relevant research on cross-domain authentication. Li et al [18] proposed a cross-domain authentication key exchange protocol in a wireless grid environment, but the use of too much symmetric encryption causes a large amount of computational overhead.…”
Section: Introductionmentioning
confidence: 99%
“…Neither KGC nor the user can generate a complete private key independently, which solves the key escrow problem in the identity-based cryptosystem. Literature [16,17] proposed a cloud user identity authentication scheme based on certificateless password system, but there was no relevant research on cross-domain authentication. Li et al [18] proposed a cross-domain authentication key exchange protocol in a wireless grid environment, but the use of too much symmetric encryption causes a large amount of computational overhead.…”
Section: Introductionmentioning
confidence: 99%
“…When users access other domains of different cryptographic systems, there is the problem of heterogeneous cross-domain authentication. Current identity authentication schemes based on mainstream cryptography systems are (a) PKI (public key infrastructure) system based on digital certificates [3], (b) identity-based cryptography (IBC) [4,5], and (c) certificateless cryptography (CLC) [6]. Among them, PKI system is the best system to guarantee network security, which can provide identity authentication in the open cloud environment.…”
Section: Introductionmentioning
confidence: 99%
“…CL-PKC has got fruitful achievements since its introduction in [2,6,7,11,25,30,31]. Al-Riyami and Paterson presented [2] the first certificateless signature (CLS) scheme.…”
Section: Related Workmentioning
confidence: 99%