Loading…
Simplifying Peer-to-Peer Device Authentication Using Identity-Based Cryptography
Identity-based cryptography (IBC) recently emerged as a major area in cryptographic research and development. This paper discusses the applications of IBC technologies to solve network device authentication problems. From the security as well as administrative perspectives, IBC can provide many adva...
Saved in:
Main Author: | |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Identity-based cryptography (IBC) recently emerged as a major area in cryptographic research and development. This paper discusses the applications of IBC technologies to solve network device authentication problems. From the security as well as administrative perspectives, IBC can provide many advantages compared to conventional authentication methods such as pre-shared keys, public key certificates, and Kerberos. A symmetric authentication protocol is presented to describe how IBC can be used for peer-to-peer device authentication across multiple domains |
---|---|
DOI: | 10.1109/ICNS.2006.101 |