Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
The grid
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Robust Key-Evolving Public Key Encryption Schemes
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Key-Insulated Public Key Cryptosystems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
An Online Credential Repository for the Grid: MyProxy
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Identity-Based Authentication for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Authorization within grid-computing using certificateless identity-based proxy signature
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
ID-based authenticated multi-group keys agreement scheme for computing grid
AICI'10 Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part II
Hi-index | 0.00 |
We examine security protocols for the Grid Security Infrastructure (GSI) version 2 and identify a weakness of poor scalability as a result of GSI's authentication framework requiring heavy interactions between a user-side client machine and resource suppliers. We improve the GSI architecture and protocols by proposing an alternative authentication framework for GSI, which uses dynamic public/private key pairs to avoid frequent communications to a significant extent. The improvement to the GSI security protocols is enabled by a novel application of an emerging cryptographic technique from bilinear pairings.