Paper published in a book (Scientific congresses, symposiums and conference proceedings)
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks
YU, Jiangshan; Wang, Guilin; Mu, Yi
2012 • In 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012
YU, Jiangshan ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Wang, Guilin
Mu, Yi
External co-authors :
yes
Language :
English
Title :
Provably Secure Single Sign-on Scheme in Distributed Systems and Networks
Publication date :
2012
Event name :
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012
Event date :
June 25-27, 2012
Main work title :
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012
A. C. Weaver and M. W. Condtry, "Distributing Internet Services to The Networks Edge", IEEE Trans. Ind. Electron., vol. 50, no. 3, pp. 404-411, Jun. 2003.
L. Barolli and F. Xhafa, "JXTA-OVERLAY: A P2P Platform for Distributed, Collaborative and Ubiquitous Computing", IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2163-2172, Oct. 2010.
L. Lamport, "Password Authentication with Insecure Communication", Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
F. Bao, R. H. Deng, "Privacy Protection for Transactions of Digital Goods", Proceedings of the Third International Conference on Information and Communications Security (ICICS '01), Springer-Verlag, London, UK, pp. 202-213.
The Open Group, "Security Forum on Single Sign-on", http://www.opengroup.org/security/l2-sso.htm.
G. Wang, J. Yu, and Q. Xie, "Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks", IACR Cryptology ePrint Archive, Report 2012/107, http://eprint.iacr.org/2012/107.
W. B. Lee and C. C. Chang, "User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks", Computer Systems Science and Engineering, vol. 15, no. 4, pp. 113-116, 2000.
T.-S. Wu and C.-L. Hsu, "Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks", Computers and Security, vol. 23, no. 2, pp. 120-125, 2004.
Y. Yang, S.Wang, F. Bao, J.Wang, and R. H. Deng, "New Efficient User Identification and Key Distribution Scheme Providing Enhanced Security", Computers and Security, vol. 23, no. 8, pp. 697-704, 2004.
K. V. Mangipudi and R. S. Katti, "A Secure Identification and Key Agreement Protocol with User Anonymity (sika)", Computers and Security, vol. 25, no. 6, pp. 420-425, 2006.
C.-L. Hsu and Y.-H. Chuang, "A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks", Inf. Sci., vol. 179, no. 4, pp. 422-429, 2009.
C.-C. Chang and C.-Y. Lee, "A Secure Single Sign-on Mechanism for Distributed Computer Networks", IEEE Transactions on Industrial Electronics, vol. 59, no. 1, pp. 629-637, 2012.
C.P. Schnorr, "Efficient Signature Generation by Smart Cards", J. Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
S. Goldwasser, S. Micali, and C. Rackoff, "The Knowledge Complexity of Interactive Proof-Systems", SIAM J. Computing, vol. 18, no. 1, pp. 186-208, Feb. 1989.
W. Mao, Modern Cryptography: Theory and Practice, Prentice Hall PTR, 2004.
J. Han, Y. Mu, W. Susilo, and J. Yan, "A Generic Construction of Dynamic Single Sign-on with Strong Security," in Proc. of SecureComm'10, pp. 181-198, LNICS 50, Springer, 2010.
M. Bellare and P. Rogaway, "Entity Authentication and Key Distribution", CRYPTO, pp. 232-249, 1993.
C.P. Schnorr, "Efficient Identification and Signatures for Smart Cards", CRYPTO ,pp. 239-252, 1989.
M. Bellare and A. Palacio, "GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks", CRYPTO, pp. 162-177, 2002.
D. Pointcheval, J. Stern, "Security Proofs for Signature Schemes", EUROCRYPT, pp. 387-398, 1996.
D. Pointcheval, J. Stern, "Security Arguments for Digital Signatures and Blind Signatures", J.Cryptology, vol.13, no.3, pp. 361-369, 2000.
S. Goldwasser, S. Micali, and L. Ronald, "A "Paradoxical" Solution to the Signature Problem (Extended Abstract)", FOCS, pp. 441-448, 1984.
S. Goldwasser, S. Micali, and R. L. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks", SIAM J. Comput., vol. 17, no. 2, pp. 281-308, 1988.