Font Size: a A A

A Cross-domain Authentication Scheme Based On A Special Proxy Re-signature

Posted on:2021-07-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y LvFull Text:PDF
GTID:2518306494491384Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Identity authentication is the security foundation of cloud computing.In the current cloud computing environment,information exchanges between different trust domains are frequent,and there is an urgent need to study a safe and efficient cross-domain identity authentication scheme between different trust domains.The proxy re-signature algorithm has the characteristic that a trusted agent can convert a user's signature on a message m into another user's signature on the same message m,and has been widely used in cross-domain identity authentication mechanisms.This article first proposes a cross-domain authentication scheme based on certificateless proxy re-signature,through the inter-cloud certification center to carry out the signature conversion of two trust domains without certificate cryptography,and realize cross-domain access between users and cloud service providers.Secondly,in the current cloud computing environment,different cryptographic systems may be used in different trust domains.When users access external domains of different cryptographic systems,there are cross-heterogeneous domain identity authentication issues.This article discusses the digital certificate-based cryptography and certificatefree cryptography.In the two domains,a cross-heterogeneous domain identity authentication scheme using proxy re-signature algorithm is proposed,which realizes cross-domain access between users and cloud service providers between two different cryptosystems.The two schemes make use of hierarchical tree of ID to realize the uniqueness of identity between two parties in communication,and effectively strengthen the security of cross-domain identity authentication mechanism by means of two-factor authentication of "password + key" and temporary identity instead of real identity.The security of the two schemes is proved under CK model.At the same time,this scheme has the anonymous traceability of user identity,and has the security attributes of effectively resisting replay attack,substitution attack and man-in-the-middle attack.The analysis results show that the cross-domain identity authentication scheme proposed by this scheme has high computing performance and security,and can effectively solve the cross-domain access requirements under the current cloud computing environment.
Keywords/Search Tags:Certificateless cryptography, Cross-domain identity authentication, Certificateless proxy re-signature, Hierarchical tree of ID
PDF Full Text Request
Related items