Article ID Journal Published Year Pages File Type
460309 Journal of Network and Computer Applications 2008 12 Pages PDF
Abstract

To solve the scalability problems of the identity authentication model based on CA for application in large distributed networks, adopting a rigorous binary tree code algorithm, we present a distributed identity authentication model based on public keys. The advantages of our model are described as follows: First, it has good scalability and is suitable for large-scale distributed networks. Second, the authentication path is short, with no more than two entities intervening. Third, it does not require users to inquire about certificate revocation lists.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,