期刊文献+

基于身份加密的匿名漫游无线认证协议 被引量:1

IBE Wireless Authentication Protocol of Anonymous Roaming
下载PDF
导出
摘要 针对移动漫游认证问题,采用基于身份加密技术和双线性对的相关特性,提出一种基于身份加密的匿名漫游无线认证协议,分析协议的安全性和匿名性,给出在非认证链路模型下安全的形式化证明。分析表明,该协议在保证用户身份不被泄漏的前提下,实现了用户与接入点之间的双向验证,满足无线网络环境的安全需求,并提供不同运营商之间的不可否认服务。与现有协议相比,该协议为匿名漫游认证提供了一种更实用的解决方案。 Aiming at the problems of authentication among roaming users, this paper proposes an Identity Based Encryption(1BE) wireless authentication protocol of anonymity roaming by using the IBE technology and the correlation characteristics of bilinear pairings. The security of authentication and anonymity are analyzed by formal approach under the unauthenticated-links model. It is showed that the protocol can achieve authentication securely, has a secure anonymity, and achieves the secure requirements of the wireless network. The protocol provides non-repudiation between different companies. Comparing with existing schemes, this protocol can be applied to the roaming authentication in the wireless network more practical.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第17期176-178,181,共4页 Computer Engineering
关键词 双线性映射 基于身份加密 匿名性 无线认证 bilinear mapping Identity Based Encryption(IBE) anonymity wireless authentication
  • 相关文献

参考文献6

二级参考文献25

  • 1朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18. 被引量:13
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85. 被引量:26
  • 4Juang W S, Lei C L, Chang C Y. Anonymous Channel and Authentication in W'treless Communications[J]. Computer Communications, 1999, 22(15): 1502-1511.
  • 5Jan J K, Whe D L. An Efficient Anonymous Channel Protocol in Wireless Communications[J]. IEICE Transactions on Communication, 2001, E84-B: 484-491.
  • 6Hwang M S, Lee C H. A New Anonymous Channel Protocol in Wireless Communications[J]. International Journal of Electronics and Communications, 2004, 58(3): 218-222.
  • 7Camenisch J, Mauter U, Stadler M. Digital Payment Systems with Passive Anonymity-revoking Trustee[J]. Journal of Computer Security Archive. 1997, 5(1): 69-89.
  • 8Raihi D M, Pointcheval D. Distributed Trustees and Revocability: A Framework for Internet Payment[C]//Proc. of the 2rid International Conference of Financial Cryptography. Anguilla, British West Indies: [s. n.], 1998.
  • 9PARK J, GO J, KIM K. Wireless authentication protocol preserving user anonymity[A]. Proceedings of the 2001 Symposium on Cryptography and Information Security[C]. Janpan, 2001
  • 10WONG D S. Security analysis of two anonymous authentication protocols for distributed wireless networks[A]. PerCom 2005 Workshops[C]. Kauai Island, Hawaii, 2005

共引文献25

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部