A scalable authentication model based on public keys

  • Authors:
  • Hongjun Liu;Ping Luo;Daoshun Wang

  • Affiliations:
  • Tsinghua National Laboratory for Information Science and Technology (TNlist ), Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China and Multi-Media Department, ...;Tsinghua National Laboratory for Information Science and Technology (TNlist ), Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China;Tsinghua National Laboratory for Information Science and Technology (TNlist ), Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China

  • Venue:
  • Journal of Network and Computer Applications
  • Year:
  • 2008

Quantified Score

Hi-index 0.01

Visualization

Abstract

To solve the scalability problems of the identity authentication model based on CA for application in large distributed networks, adopting a rigorous binary tree code algorithm, we present a distributed identity authentication model based on public keys. The advantages of our model are described as follows: First, it has good scalability and is suitable for large-scale distributed networks. Second, the authentication path is short, with no more than two entities intervening. Third, it does not require users to inquire about certificate revocation lists.