Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (6): 32-37.doi: 10.11959/j.issn.2096-109x.2016.00047

• academic paper • Previous Articles     Next Articles

Identity authentication scheme based on identity-based encryption

Ren-ji HUANG(),Xiao-ping WU,Hong-cheng LI   

  1. Department of Information Security,Naval University of Engineering,Wuhan 430033,China
  • Revised:2016-05-06 Online:2016-06-15 Published:2020-03-26
  • Supported by:
    The National Natural Science Foundation of China(61100042);The Natural Science Foundation of Hubei Province(2015CFC867);The National Social Science Found Project in Military Science(15GJ003-201)

Abstract:

In large-scale communication nodes network,there are a large number of network nodes and so many types of equipment.So there are problems of certificate management difficulties and resource waste in the tradi-tional PKI cryptosystem.A mutual node authentication scheme based on identity-based encryption,which solved the problem of the digital certificate management in the PKI system by the identity-based encryption and the key escrow problem in identity based cryptograph by splitting the key as well,was designed.At the same time,the introduction of random factor,timestamp and hash algorithm in the authentication protocol prevented various network attacks.Finally,the security and efficiency of the encryption algorithm and the security of the authentication protocol were analyzed,which proved the security and reliability of the authentication scheme.

Key words: node identity authentication, identity based cryptograph, key escrow, encryption

CLC Number: 

No Suggested Reading articles found!