Abstract
Vector Network is a new type of network, which is light connection and enables QoS. Vector Network provides two types of services: best effort and QoS guaranteed. The latter requires strict access authentication, which should be not only safe and convenient for use, but also able to protect the user’s privacy, and prevent hackers from tracking. Therefore, this paper proposes an improved scheme for a hierarchical identity based on signature and authentication, which is used to meet the requirements of Vector Network authentication. At last we achieve the scheme in experiment and point out that it has advantages in terms of efficiency and security over traditional network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yoon, H.S.: A large-scale ATM switch: analysis, simulation and implementation. In: 1st IEEE International Conference on ATM, ICATM 1998, pp. 459–464. IEEE (1998)
McDysan, D.: QoS and Traffic Management in IP and ATM Networks. McGraw-Hill Companies, Inc., New York City (2000)
Davie, B., Rekhter, Y.: MPLS Technology and Applications. Morgan Kaufmann Publishers, Burlington (2000)
Liang, M., Zhang, J., Wang, S.: A new network based on vector address. In: ICWMMN 2008 Proceedings (2008)
Liang, M.: Coding method of vector network address. US Patent No. 12/304,435, 27 Dec 2007
Wang, Z.W., Liang, M.G.: Vector label switching (VLS): a high-performance switching architecture for future internet. J. Internet Technol. 1, 11–13 (2011)
Wang, Z.W., Liang, M.G.: Vector address switching: an energy-effective next-generation switching technology for internet. Tamkang J. Sci. Eng. 9, 11–13 (2011)
Qi, G., Liang, M.: Research and design of layering accessing authentication based on RSA in vector network. In: Cross-Strait Conference on Information Science and Technology, Qinhuangdao, People’s Republic of China, 9–11 July 2010, pp. 234–237 (2010)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Kuzhalvaimozhi, S., Rao, G.R.: Privacy protection in cloud using identity based group signature. In: Applications of Digital Information and Web Technologies, pp. 75–80. IEEE (2014)
Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445–464. Springer, Heidelberg (2006). https://doi.org/10.1007/11761679_27
Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28628-8_3
Nguyen, L., Safavi-Naini, R.: Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 372–386. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30539-2_26
Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: the case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136–153. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30574-3_11
Chen, P., et al.: An escrow-free hierarchical identity-based signature scheme from composite order bilinear groups. In: International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 364–369. IEEE Computer Society (2015)
Lewko, A., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455–479. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-11799-2_27
Acknowledgments
This research is supported by the National Natural Science Foundation of China (Grant No. U1636109). And the title is Scalability of Datacenter Network for Cloud Computing.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Yu, J., Liang, M. (2017). An Anonymous Identity-Based Authentication Scheme in Vector Network. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-72395-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72394-5
Online ISBN: 978-3-319-72395-2
eBook Packages: Computer ScienceComputer Science (R0)