Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Efficient Implementation of Pairing-Based Cryptosystems
Journal of Cryptology
Short Signatures from the Weil Pairing
Journal of Cryptology
Architecture design of grid GIS and its applications on image processing based on LAN
Information Sciences—Informatics and Computer Science: An International Journal
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
Design and development of Distributed Virtual Geographic Environment system based on web services
Information Sciences: an International Journal
A collaborative virtual geographic environment based on P2P and Grid technologies
Information Sciences: an International Journal
Information Sciences: an International Journal
Batch verifications with ID-Based signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
A secure collaboration service for dynamic virtual organizations
Information Sciences: an International Journal
Hi-index | 0.07 |
The X.509 proxy certificate is widely used to delegate an entity's right to another entity in the computational grid environment. However, this proxy certificate has two drawbacks: the potential security threat caused by non-traceability of a delegation chain and the inefficiency caused by an interactive communication between the right grantor and the right grantee on the delegation protocol. To address these problems, a new delegation protocol is presented. The proposed protocol employs an ID-based key generation technique to support delegation traceability and non-interactive delegation. Since access-right delegation occurs frequently in the computational grid environment, the proposed protocol can enhance security by providing delegation traceability and can enhance efficiency by reducing the inter-domain communication cost.