Security

On the Use of ID-Based Cryptography for the Definition of New EAP Authentication Methods

Free registration required

Executive Summary

The authors propose in this paper, two ID-Based authentication methods for the Extensible Authentication Protocol (EAP), as an alternative to methods relying on Public Key Infrastructure (PKI), to provide nodes with private and public keys. ID-Based Cryptography (IBC) proposes to derive the public key from the node's identity directly. As such, there is no need for deployment of a Certification Authority (CA) and the burdensome management of certificates is removed. IBC relies on a Private Key Generator (PKG) for the computation of stations private keys. Their first presented authentication method corresponds to a situation where the PKG is trustful. As such, the PKG generates the private keys of all the network stations.

  • Format: PDF
  • Size: 853.91 KB