TY - JOUR AU - Kamali, Seyed Hossein AU - Hedayati, Maysam AU - Shakerian, Reza AU - Ghasempour, Saber PY - 2011 TI - Using Identity-based Secret Public Keys Cryptography for Heuristic Security Analyses in Grid Computing JO - Journal of Mathematics and Computer Science SP - 357--375 VL - 3 IS - 4 AB - The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. Identity-based secret public keys have some attractive properties which seem to align well with the demands of grid computing. In this Paper, we proposed identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or Diffie-Hellman keys. We examine identity-based secret public key protocols and give informal security analyses which show that they may well be secure against online password guessing and other attacks. More importantly, we present an identity-based secret public key version of the standard TLS protocol. Our new protocol allows passwords to be tied directly to the establishment of secure TLS channels. SN - ISSN 2008-949X UR - http://dx.doi.org/10.22436/jmcs.03.04.01 DO - 10.22436/jmcs.03.04.01 ID - Kamali2011 ER - TY - JOUR TI - The grid in a nutshell AU - I. Foster AU - C. Kesselman JO - in: Grid Resource Management PY - 2004 DA - 2004// VL - 2004 ID - Foster2004 ER - TY - JOUR TI - Protecting poorly chosen secrets from guessing attacks AU - L. Gong AU - T. M. A. Lomas AU - R. M. Needham AU - J. H. Saltzer JO - IEEE Journal on Selected Areas in Communications PY - 1993 DA - 1993// VL - 11 ID - Gong1993 ER - TY - JOUR TI - Secure Authentication Protocols Resistant to Guessing Attacks AU - J. N. Luo AU - S. Shieh AU - J. C. Shen JO - Journal of information science and engineering PY - 2006 DA - 2006// VL - 22 ID - Luo2006 ER - TY - JOUR TI - Undetectable on-line password guessing attacks AU - Y. Ding AU - P. Horster JO - ACM Operating Systems Review PY - 1995 DA - 1995// VL - 29 ID - Ding1995 ER - TY - JOUR TI - Number theoretic attacks on secure password schemes AU - S. Patel JO - Proceedings of the 1997 IEEE Symposium on Security and Privacy PY - 1997 DA - 1997// VL - 1997 ID - Patel1997 ER - TY - JOUR TI - Optimal asymmetric encryption AU - M. Bellare AU - P. Rogaway JO - Workshop on the Theory and Application of of Cryptographic Techniques PY - 1995 DA - 1995// VL - 1995 ID - Bellare1995 ER - TY - JOUR TI - Secure password-based cipher suite for TLS AU - M. Steiner AU - P. Buhler AU - T. Eirich AU - M. Waidner JO - ACM Transactions on Information and System Security PY - 2001 DA - 2001// VL - 4 ID - Steiner2001 ER - TY - JOUR TI - One-time verifier-based encrypted key exchange AU - M. Abdalla AU - O. Chevassut AU - D. Pointcheval JO - International Workshop on Public Key Cryptography PY - 2005 DA - 2005// VL - 2005 ID - Abdalla2005 ER - TY - JOUR TI - Password-based authenticated key exchange in the three-party setting AU - M. Abdalla AU - P. Fouque AU - D. Pointcheval JO - International Workshop on Public Key Cryptography PY - 2005 DA - 2005// VL - 2005 ID - Abdalla2005 ER - TY - JOUR TI - Simple password-based encrypted key exchange protocols AU - M. Abdalla AU - D. Pointcheval JO - Cryptographers’ track at the RSA conference PY - 2005 DA - 2005// VL - 2005 ID - Abdalla2005 ER - TY - JOUR TI - Certificateless public key cryptography AU - S. S. Al-Riyami AU - K. G. Paterson JO - International Conference on the Theory and Application of Cryptology and Information Security PY - 2003 DA - 2003// VL - 2003 ID - Al-Riyami2003 ER - TY - JOUR TI - Key-privacy in public-key encryption AU - M. Bellare AU - A. Boldyreva AU - A. Desai AU - D. Pointcheval JO - International Conference on the Theory and Application of Cryptology and Information Security PY - 2001 DA - 2001// VL - 2001 ID - Bellare2001 ER - TY - JOUR TI - Authenticated key exchange secure against dictionary attacks AU - M. Bellare AU - D. Pointcheval AU - P. Rogaway JO - International conference on the theory and applications of cryptographic techniques PY - 2000 DA - 2000// VL - 2000 ID - Bellare2000 ER - TY - JOUR TI - Identity-based encryption from the Weil pairing AU - D. Boneh AU - M. Franklin JO - Annual international cryptology conference PY - 2001 DA - 2001// VL - 2001 ID - Boneh2001 ER - TY - BOOK TI - Protocols for Authentication and Key Establishment AU - C. Boyd AU - A. Mathuria PB - Springer-Verlag PY - 2003 DA - 2003// CY - Berlin ID - Boyd2003 ER - TY - JOUR TI - On the use of RSA as a secret key cryptosystem AU - K. Brincat JO - Designs, Codes, and Cryptography PY - 2001 DA - 2001// VL - 22 ID - Brincat2001 ER - TY - JOUR TI - Cryptographically strong undeniable signatures, unconditionally secure for the signer AU - D. Chaum AU - E. V. Heijst AU - B. Pfitzmann JO - Annual International Cryptology Conference PY - 1991 DA - 1991// VL - 1991 ID - Chaum1991 ER - TY - BOOK TI - Exponentiation Cryptographic Apparatus and Method AU - M. E. Hellman AU - S. C. Pohlig PB - U.S. Patent (No. 4,424,414) PY - 1984 DA - 1984// CY - Washington ID - Hellman1984 ER - TY - JOUR TI - Efficient signcryption with key privacy from gap Diffie-Hellman groups AU - B. Libert AU - J-J. Quisquater JO - International Workshop on Public Key Cryptography PY - 2004 DA - 2004// VL - 2004 ID - Libert2004 ER - TY - JOUR TI - Identity-based partial message recovery signatures (or how to shorten ID-based signatures) AU - F. Zhang AU - W. Susilo AU - Y. Mu JO - International Conference on Financial Cryptography and Data Security PY - 2005 DA - 2005// VL - 2005 ID - Zhang2005 ER - TY - JOUR TI - Digital signcryption or how to achieve cost (signature & encryption)≪ cost (signature)+ cost (encryption) AU - Y. Zheng JO - Annual International Cryptology Conference PY - 1997 DA - 1997// VL - 1997 ID - Zheng1997 ER - TY - BOOK TI - The TLS protocol version 1.0 AU - T. Dierks AU - C. Allen PB - The Internet Engineering Task Force (IETF) PY - 1999 DA - 1999// CY - U.S.A. ID - Dierks1999 ER -