Abstract
The security requirements especially for secure group communication are discussed in grid circumstance. When several processes generated by a user want to communicate securely, they have to share a secret key to communicate. We use the identity-based cryptography to implement the secure group communication. Finally, we describe the advantages of our scheme.
This paper is supported by the National Natural Science Foundation of China under Grant No.60173033.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Foster, I. and Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann 2–48 (1999)
Welch, V., Siebenlist, F. and Foster, I. et al.: Security for grid services. Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC’03), (2003)
Butler, R., Foster, D. and Kesselman, I. et al.: A National-Scale Authentication Infrastructure. IEEE Computer, 33(12), 60–66 (2000)
Gasser, M. and McDermott, E.: An architecture for practical delegation in a distributed system. Proc. 1990 IEEE Symposium on Research in Security and Privacy, IEEE Press, 20–30 (1990)
Linn, J.: Generic Security Service Application Program Interface. Version 2. INTERNET RFC 2078, (1997)
Foster, I., Kesselman, C. and Tsudik, G.: A Security Architecture for Computational Grids. ACM Conference on Computers and Security, 83–91 (1998)
Sakai, R., Ohgishi, K. and Kasahara, M.: Cryptosystems based on pairing. In SCIS, Okinawa, Japan, (2000)
Joux, A.: A one-round protocol for tripartite Diffie-Hellman. Algorithm Number Theory Symposium-ANTS-IV, Lecture Notes in Computer Science 1838, Springer-Verlag 385–394 (2000)
Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. Journal of Cryptology. 17, 263–276 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, L., Huang, X., You, J. (2005). ID-based Secure Group Communication in Grid Computing. In: Zhang, W., Tong, W., Chen, Z., Glowinski, R. (eds) Current Trends in High Performance Computing and Its Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-27912-1_26
Download citation
DOI: https://doi.org/10.1007/3-540-27912-1_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25785-1
Online ISBN: 978-3-540-27912-9
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)