GUO Ya-jun~ 1,2 , HONG Fan~ 1 1. School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China;2. Department of Computer Science, Central China Normal University, Wuhan 430079, Hubei, China
通讯作者:
Guo, Y.-J.(ccnugyj@126.com)
作者机构:
[Hong Fan] School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan Hubei, China
Department of Computer Science, Central China Normal University, Wuhan Hubei, China
[GUO Ya-jun~ 1,2 , HONG Fan~ 1 1. School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China] School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan Hubei, China<&wdkj&>Department of Computer Science, Central China Normal University, Wuhan Hubei, China
通讯机构:
School of Computer Science and Technology, Huazhong University of Science and Technology, China
Supported by the National Natural Science Funda-tion of China (60403027) ; Natural Science Fundation Of Hubei Prov-ince of China(2005ABA243);
机构署名:
本校为其他机构
院系归属:
计算机学院
摘要:
It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication pro...