期刊文献+

一种用于移动通信的匿名认证方案 被引量:3

Anonymous authentication scheme for mobile communication
在线阅读 下载PDF
导出
摘要 为了使移动网络向用户提供匿名服务,保证用户的身份和行踪等信息的机密性,提出了一种匿名认证方案,不仅解决了用户在漫游网中的匿名问题,而且也解决了在归属网中难以实现的匿名服务问题.本方案不仅通信量小,而且也无需每次更换密钥.本方案以知识证明为基础,采用直接匿名认证协议理论并结合加密传输和签名验证来实现.理论和分析实验表明,用户漫游时无需到家乡代理验证身份,且在归属网中无需映射出自己的真实身份,有效地实现了全网匿名. In order to enable the mobile network to provide anonymity services and ensure the confidentiality of the user's identity, whereabouts and other information, we put up an anonymous authentication scheme, which solves the problem of user's anonymity not only in roaming network, but also in adscription network. The scheme has not only a small amount of communication, hut also does not need to change the key every time. The scheme is based on the knowledge proof, and uses the direct anonymous attestation protocol theory together with encrypting transfer and signature validation for its implementation. Theoretical analysis and experimental results demonstrate that users do not need to go to the home agent to authenticate the user's identity in the roaming network, and that there is no need to map out its true identity in the adscription network. It implements user's anonymity in the whole network effectively.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2011年第1期176-183,共8页 Journal of Xidian University
基金 国家863计划资助项目(2007AA01Z430) 国家自然科学基金资助项目(60821001) 国家重大科技专项资助项目(2009ZX03004-003-03)
关键词 认证 匿名 移动计算 隐私保护 authentication anonymous mobile computing privacy protecting
  • 相关文献

参考文献17

  • 1Jiang Yixin, Lin Chuang. Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks [ J]. IEEE Trans on Wireless Communications, 2006, 5(9): 1-8.
  • 2Hwang R J, Li Jingfeng, Hsiao Y K. A Wirelessbased Authentication and Anonymous Channels for GSM System[ J]. Journal of Computers, 2006, 17(1) : 31-36.
  • 3Horn G, Martin K, Mitchel C J. Authentication Protocols for Mobile Network Environment Value-added Services[ J]. IEEE Trans on Vehicular Technology, 2002, 51(2): 383-392.
  • 4Beller M, Chang L, Yacobi Y. Privacy and Authentication on a Portable Communications System[ J]. IEEE J Selected Areas in Comm, 1993, 11(6): 821-829.
  • 5万仁福,李方伟,朱江.匿名双向认证与密钥协商新协议[J].电子科技大学学报,2005,34(1):61-64. 被引量:5
  • 6张跃宇,李晖,王育民.一种基于群签名的安全电子拍卖方案[J].西安电子科技大学学报,2008,35(4):614-619. 被引量:4
  • 7孙纪敏,孙玉,张思东,裴庆祺.基于ID的认证及密钥协商协议[J].西安电子科技大学学报,2008,35(3):559-562. 被引量:8
  • 8Brickell E, Camenisch J, Chen L. Direct Anonymous Attestation[ C]//Proc of the llth ACM Conference on Computer and Communications Security. New York: ACM Press, 2004:132-145.
  • 9Camenisch J, Lysyanskaya A. A Signature Scheme with Efficient Protocols[ C]//Proc of the Third International Conference on Security in Communication Networks, LNCS 2576. Amalfi: Springer-Verlag, 2003: 268-289.
  • 10Fiat A, Shamir A. How to Prove Yourself: Practical Solutions to Identification and Signature Problems[ C] //Advances in Cryptology--CRYPTO'86, LNCS 263. Berlin: Springer-Verlag, 1987: 186-194.

二级参考文献102

共引文献30

同被引文献13

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部