Skip to main content

An Anonymous Identity-Based Authentication Scheme in Vector Network

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10658))

  • 2872 Accesses

Abstract

Vector Network is a new type of network, which is light connection and enables QoS. Vector Network provides two types of services: best effort and QoS guaranteed. The latter requires strict access authentication, which should be not only safe and convenient for use, but also able to protect the user’s privacy, and prevent hackers from tracking. Therefore, this paper proposes an improved scheme for a hierarchical identity based on signature and authentication, which is used to meet the requirements of Vector Network authentication. At last we achieve the scheme in experiment and point out that it has advantages in terms of efficiency and security over traditional network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yoon, H.S.: A large-scale ATM switch: analysis, simulation and implementation. In: 1st IEEE International Conference on ATM, ICATM 1998, pp. 459–464. IEEE (1998)

    Google Scholar 

  2. McDysan, D.: QoS and Traffic Management in IP and ATM Networks. McGraw-Hill Companies, Inc., New York City (2000)

    Google Scholar 

  3. Davie, B., Rekhter, Y.: MPLS Technology and Applications. Morgan Kaufmann Publishers, Burlington (2000)

    Google Scholar 

  4. Liang, M., Zhang, J., Wang, S.: A new network based on vector address. In: ICWMMN 2008 Proceedings (2008)

    Google Scholar 

  5. Liang, M.: Coding method of vector network address. US Patent No. 12/304,435, 27 Dec 2007

    Google Scholar 

  6. Wang, Z.W., Liang, M.G.: Vector label switching (VLS): a high-performance switching architecture for future internet. J. Internet Technol. 1, 11–13 (2011)

    Google Scholar 

  7. Wang, Z.W., Liang, M.G.: Vector address switching: an energy-effective next-generation switching technology for internet. Tamkang J. Sci. Eng. 9, 11–13 (2011)

    Google Scholar 

  8. Qi, G., Liang, M.: Research and design of layering accessing authentication based on RSA in vector network. In: Cross-Strait Conference on Information Science and Technology, Qinhuangdao, People’s Republic of China, 9–11 July 2010, pp. 234–237 (2010)

    Google Scholar 

  9. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  10. Kuzhalvaimozhi, S., Rao, G.R.: Privacy protection in cloud using identity based group signature. In: Applications of Digital Information and Web Technologies, pp. 75–80. IEEE (2014)

    Google Scholar 

  11. Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445–464. Springer, Heidelberg (2006). https://doi.org/10.1007/11761679_27

    Chapter  Google Scholar 

  12. Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28628-8_3

    Chapter  Google Scholar 

  13. Nguyen, L., Safavi-Naini, R.: Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 372–386. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30539-2_26

    Chapter  Google Scholar 

  14. Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: the case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136–153. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30574-3_11

    Chapter  Google Scholar 

  15. Chen, P., et al.: An escrow-free hierarchical identity-based signature scheme from composite order bilinear groups. In: International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 364–369. IEEE Computer Society (2015)

    Google Scholar 

  16. Lewko, A., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455–479. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-11799-2_27

    Chapter  Google Scholar 

Download references

Acknowledgments

This research is supported by the National Natural Science Foundation of China (Grant No. U1636109). And the title is Scalability of Datacenter Network for Cloud Computing.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, J., Liang, M. (2017). An Anonymous Identity-Based Authentication Scheme in Vector Network. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics