期刊文献+

一种基于身份的匿名无线认证协议 被引量:1

An ID-Based Wireless Authentication Protocol with Anonymity
在线阅读 下载PDF
导出
摘要 针对移动用户漫游时需进行匿名认证问题,利用双线性对和椭圆曲线的相关特性,提出了一种基于身份的匿名无线认证协议.并对该协议的安全性和匿名性进行了详细分析,给出了移动用户匿名性在非认证链路模型下安全的形式化证明.分析表明,该协议实现了用户与接入点的双向身份认证和移动用户身份的匿名性,满足无线网络环境的安全需求.与同类协议相比计算量大幅减少,为匿名无线认证提供了一种较实用的解决方案. Considering the special requirements of the authentication protocol between the roaming users and the visited networks, an ID based wireless authentication protocol was proposed. The security of authentication and anonymity was analyzed in detail. Particularly, the anonymous security was analyzed by formal approach under the unauthenticated links adversarial model. It was showed that the proposed protocol could not only achieve authentication securely but also has a secure anonymity, and could satisfy the security requirements of the wireless network.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2008年第5期579-582,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家高技术研究发展计划(863)项目(2007AA01Z435) 国家自然科学基金(60473027,60772136) 高等学校学科创新引智计划(111计划)项目(B08038)
关键词 密码学 认证协议 匿名性 无线网络 cryptography authentication protocol anonymity wireless network
  • 相关文献

参考文献10

  • 1Park J,Go J,Kim K. Wireless Authentication Protocol Preserving User Anonymity[DB/OL]. [2008-01-08]. http: //citeseer. ist, psu. edu/ parkO l wireless, html.
  • 2Wong D S. Security Analysis of Two Anonymous Au thentication Protocols for Distributed Wireless Net works [C]//Per Corn 2005 Workshops. New York IEEE Press, 2005 : 284-288.
  • 3Kang M H,Ryou H B,Choi W. Design of Anonymity Preserving User Authentication and Key Agreement Protocol for Ubiquitous Computing Environments [C]//WINE 2005 (LNCS 3828). Berlin: SpringerVerlag, 2005 : 491-499.
  • 4彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85. 被引量:26
  • 5彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 6Baek J, Safavi-Naini R, Susilo W. Universal Designat ed Verifier Signature Proof[C]//Advances in Cryptol ogy-ASIACRYPT'05 (LNCS 3788). Berlin: Spring er-Verlag, 2005 : 644-661.
  • 7Zhang F,Safavi-Naini R, Susilo W. An Efficient Signature Scheme from Bilinear Pairings and Its Applica tions[C]//Practice and Theory in PKC ' 04 (LNCS 2947). Berlin : Springer-Verlag, 2004 : 277-290.
  • 8Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing[C]//Advances in Cryptology CRYP- TO' 01 ( LNCS 2139 ). Berlin: Springer VerIag, 2001 : 213-229.
  • 9Canetti R, Krawezyk H. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channel [DB/OL]. [2007-12-19]. http://www. iacr. org/ar- chive/eurocrypt2001/20450451, pd f .
  • 10Tin Y ST,Vasanta H,BoydC. Protocols with Securi ty Proofs for Mobile Applications [DB/OL]. [2007 10- 19]. http://citeseer, ist. psu. edu/ 637939. html.

二级参考文献21

  • 1朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18. 被引量:13
  • 2彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 3Zhu J. , Ma J.. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 2004
  • 4Canetti R. , Krawczyk H.. Analysis of key-exchange protocols and their use for building secure channels. In: Proceedings of the Cryptology-Eurocrypt 2001, 2001, 453-474
  • 5Shamir A.. Identity-based cryptosystems and signature schemes. In: Proceedings of the Cryptology-Crypto ' 84, 1984,47-53
  • 6Boneh D. , Franklin M.. Identity-based encryption from the weil pairing. In: Proceedings of the Cryptology-Crypto 2001,2001, 213-229
  • 7Bellare M. , Canetti R. , Krawczyk H.. A modular approach to the design and analysis of authentication and key exchange protocols. In: Proceedings of the 30th ACM Symposium on Theory of Computing, ACM, 1998, 419-428
  • 8Chen L. , Kudla C.. Identity based authenticated key agree-ment protocols from pairings. In: Proceedings of the 16th IEEE Computer Security Foundations Workshop, 2003,219-233
  • 9Blake-Wilson S. , Johnson D. , Menezes A.. Key agreement protocols and their security analysis. In: Proceedings of the 6th IMA International Conference on Cryptography and Coding,1997, 30-45
  • 10Boyd C. , Mao W. , Paterson K. G.. Key agreement using statically keyed authenticators. In: Proceedings of the 2nd International Conference on Applied Cryptography and Network Security, 2004, 248-262

共引文献75

同被引文献7

  • 1王治国,肖德贵湖南大学计算机与通讯学院.基于无线PKI的微型证书的分析与实现[J].科学技术与工程,2006,6(3):278-282. 被引量:4
  • 2邓晓军.证书撤销机制的分析与研究[J].计算机工程与设计,2007,28(7):1538-1540. 被引量:5
  • 3Wireless Application Protocol Forum. Wireless transport layer security [EB/OL]. [2011-06-01]. WAP-261-WTLS-20010406- a, http://www, wapforurrL org/.
  • 4Yong Lee, Jeail Lee, JooSeok Song. Design and implementa- tion of wireless PKI technology suitable for mobile phone in mo- bile commerce [J]. Computer Communications, 2006, 30 (4) . 893-903.
  • 5Choi Sang-Wook, Chae Cheol-Joo, Lee Jae-Kwang. A study on the efficient mutual authentication mechanism using the agent server [C]. Second International Conference on Future Generation Communicition and Networking, Los Alamitos: IEEE Computer Society, 2008: 485-488.
  • 6Dongjin Kwak, Jae Cheol Ha, Hoonjae Lee. A WTLS hand- shake protocol with user anonymity and forward secrecy [G]. LNCS 2524: Proceedings of Mobile Communications: the 7th CDMA International Conference. Berlin. Springer-Verlag, 2002 : 219-230.
  • 7穆灵,王凌燕,张治江,张来顺.无线传感器网络的安全认证协议研究[J].计算机工程与设计,2009,30(23):5379-5381. 被引量:3

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部