The University of Southampton
University of Southampton Institutional Repository

Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources

Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources
As the amount of information resources on the Web keeps increasing so are the concerns for information integrity, confidentiality and authenticity. In Web 2.0 users are producers as well as consumers of content and metadata, which makes guaranteeing the authenticity and integrity of information critical. The scale of the Web requires that any proposals in this direction require minimal (if any) infrastructural or administrative changes. This paper proposes the use of ID-based cryptography (IBC) to address requirements for integrity and authenticity of Web resources using either the URL/URI of a resource or the DNS name part of if. This approach presents certain challenges, which are discussed along with the pros and cons of different designs and implementations.
Identity Based Cryptography, Integrity, Authenticity, Web 2.0
978-3-642-05283-5
Springer
Tiropanis, Thanassis
d06654bd-5513-407b-9acd-6f9b9c5009d8
Dimitriou, Tassos
bf48c825-a17a-4b31-be6a-9f5f729a28d8
Tiropanis, Thanassis
d06654bd-5513-407b-9acd-6f9b9c5009d8
Dimitriou, Tassos
bf48c825-a17a-4b31-be6a-9f5f729a28d8

Tiropanis, Thanassis and Dimitriou, Tassos (2009) Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources. In, Security and Privacy in Communication Networks-5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. Springer.

Record type: Book Section

Abstract

As the amount of information resources on the Web keeps increasing so are the concerns for information integrity, confidentiality and authenticity. In Web 2.0 users are producers as well as consumers of content and metadata, which makes guaranteeing the authenticity and integrity of information critical. The scale of the Web requires that any proposals in this direction require minimal (if any) infrastructural or administrative changes. This paper proposes the use of ID-based cryptography (IBC) to address requirements for integrity and authenticity of Web resources using either the URL/URI of a resource or the DNS name part of if. This approach presents certain challenges, which are discussed along with the pros and cons of different designs and implementations.

Text
IBC-WEBshort.pdf - Other
Download (165kB)

More information

Published date: 29 October 2009
Keywords: Identity Based Cryptography, Integrity, Authenticity, Web 2.0
Organisations: Web & Internet Science

Identifiers

Local EPrints ID: 268015
URI: http://eprints.soton.ac.uk/id/eprint/268015
ISBN: 978-3-642-05283-5
PURE UUID: 4acbc003-70eb-42a0-98e3-76a9f942a277
ORCID for Thanassis Tiropanis: ORCID iD orcid.org/0000-0002-6195-2852

Catalogue record

Date deposited: 06 Oct 2009 14:48
Last modified: 15 Mar 2024 03:31

Export record

Contributors

Author: Thanassis Tiropanis ORCID iD
Author: Tassos Dimitriou

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×