Trust-Distributed-Based Authentication Mechanism Using Hierarchical Identity-Based Cryptography
Tian Junfeng,Sun Kehui +1 more
Reads0
Chats0
About:
This article is published in Journal of Computer Research and Development.The article was published on 2015-07-01 and is currently open access. It has received 3 citations till now. The article focuses on the topics: Identity (object-oriented programming) & Authentication.read more
Citations
More filters
Journal ArticleDOI
Heterogeneous Cross-Domain Identity Authentication Scheme Based on Proxy Resignature in Cloud Environment
Yongyang Lv,Wenju Liu,Ze Wang +2 more
TL;DR: The results of this paper show that the proposed scheme has better computing performance and higher security than existing schemes based on proxy resignature, and the security of the scheme is proved under the CK model.
Journal ArticleDOI
Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing
TL;DR: The scheme can not only realize tracking function under the condition of guaranteeing user’s privacy, but can also simplify the authentication calculation process to improve the efficiency of the cross domain identity authentication, and its performance is more suitable for large-scale cloud computing environment.
Journal ArticleDOI
Research on Cyber Security Defense and Protection in Power Industry
Zhiyu Chen,Yonghe Guo,Bai Dongxia,Jiaxin Wang,Yaozhong Dong,Shengqi Qian,Teng Lu,Hairui Xing +7 more
TL;DR: A power information security framework based on cloud service was proposed to improve the safety and reliability, build an end-to-end electronic authentication mechanism and security management mode of strong data interworking, meet the rapid development of the energy internet and escort the new digital economic of the power industry.