Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
460309 | Journal of Network and Computer Applications | 2008 | 12 Pages |
Abstract
To solve the scalability problems of the identity authentication model based on CA for application in large distributed networks, adopting a rigorous binary tree code algorithm, we present a distributed identity authentication model based on public keys. The advantages of our model are described as follows: First, it has good scalability and is suitable for large-scale distributed networks. Second, the authentication path is short, with no more than two entities intervening. Third, it does not require users to inquire about certificate revocation lists.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Hongjun Liu, Ping Luo, Daoshun Wang,