Download now Free registration required
The authors propose in this paper, two ID-Based authentication methods for the Extensible Authentication Protocol (EAP), as an alternative to methods relying on Public Key Infrastructure (PKI), to provide nodes with private and public keys. ID-Based Cryptography (IBC) proposes to derive the public key from the node's identity directly. As such, there is no need for deployment of a Certification Authority (CA) and the burdensome management of certificates is removed. IBC relies on a Private Key Generator (PKG) for the computation of stations private keys. Their first presented authentication method corresponds to a situation where the PKG is trustful. As such, the PKG generates the private keys of all the network stations.
- Format: PDF
- Size: 853.91 KB