Using Identity-based Secret Public Keys Cryptography for Heuristic Security Analyses in Grid Computing


Authors

Seyed Hossein Kamali - Islamic Azad University of Qazvin Branch, Qazvin, Iran Maysam Hedayati - Islamic Azad University-Ghaemshahr Branch, Ghaemshahr, Iran Reza Shakerian - Payame Noor University, P. O. BOX 19395-3697, Tehran, Iran Saber Ghasempour - Department of Mathematics, Payame Noor University, P. O. BOX 19395-3697, Tehran, Iran


Abstract

The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. Identity-based secret public keys have some attractive properties which seem to align well with the demands of grid computing. In this Paper, we proposed identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or Diffie-Hellman keys. We examine identity-based secret public key protocols and give informal security analyses which show that they may well be secure against online password guessing and other attacks. More importantly, we present an identity-based secret public key version of the standard TLS protocol. Our new protocol allows passwords to be tied directly to the establishment of secure TLS channels.


Keywords


MSC


References