期刊文献+

一种具有可控匿名性的无线认证协议 被引量:1

Controllable Anonymous Wireless Authentication Protocol
下载PDF
导出
摘要 针对无线匿名认证协议中因家乡域身份信息暴露而导致协议匿名性降低及匿名服务滥用的问题,提出一种基于无线网络环境下的可控匿名认证协议。通过使用历史访问域转发认证信息的方法实现家乡域的匿名,通过检查认证标记拒绝非法用户的认证请求,达到对协议的可控性要求。描述协议的实现过程,分析协议的安全性和匿名性。分析结果表明,该协议能提高家乡域的匿名性,可有效控制匿名的滥用。 An anonymous authentication protocol is proposed to improve the anonymity and to control anonymity abusing for wireless communications. The protocol implemented the anonymity of Home Location Register(HL, R) using Visitor Location Register(VLR) which has been employed to forward the authentication message by Mobile Station(MS). Through checking the authentication token, this protocol can control anonymity abusing. The probability statistics is adopted to analyze the security and anonymity of this protocol. The analysis results show that this protocol not only improves the anonymity of HLR but also defends anonymity abusing effectively.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第6期139-141,共3页 Computer Engineering
基金 湖南省科技计划基金资助项目(20063342467) 湖南大学博士基金资助项目(521105255)
关键词 无线通信 数据隐私 匿名协议 可控匿名 wireless communications data privacy anonymous protocol controllable anonymity
  • 相关文献

参考文献5

  • 1Juang W S, Lei C L, Chang C Y. Anonymous Channel and Authentication in W'treless Communications[J]. Computer Communications, 1999, 22(15): 1502-1511.
  • 2Jan J K, Whe D L. An Efficient Anonymous Channel Protocol in Wireless Communications[J]. IEICE Transactions on Communication, 2001, E84-B: 484-491.
  • 3Hwang M S, Lee C H. A New Anonymous Channel Protocol in Wireless Communications[J]. International Journal of Electronics and Communications, 2004, 58(3): 218-222.
  • 4Camenisch J, Mauter U, Stadler M. Digital Payment Systems with Passive Anonymity-revoking Trustee[J]. Journal of Computer Security Archive. 1997, 5(1): 69-89.
  • 5Raihi D M, Pointcheval D. Distributed Trustees and Revocability: A Framework for Internet Payment[C]//Proc. of the 2rid International Conference of Financial Cryptography. Anguilla, British West Indies: [s. n.], 1998.

同被引文献5

  • 1Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing[J].SIAM Journal of Computing,2003,32(3):586-615.
  • 2Fathi H,Shin S H,Kobara K,et al.Protocols for Purpose-restricted Anonymous Communications in IP-based Wireless Networks[J].Computer Communications,2008,31 (15):3662-3671.
  • 3Canetti R,Krawczyk H.Analysis of Key-exchange Protocols and Their Use for Building Secure Channels[C] //Proc.of EuroCrypt'01.Innsbruck,Austria:[s.n.] ,2001:453-474.
  • 4朱辉,李晖,苏万力,王育民.基于身份的匿名无线认证方案[J].通信学报,2009,30(4):130-136. 被引量:16
  • 5侯惠芳,刘光强,季新生,张秋闻.基于公钥的可证明安全的异构无线网络认证方案[J].电子与信息学报,2009,31(10):2385-2391. 被引量:13

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部