期刊文献+

椭圆曲线加密结合散列函数的移动网络匿名安全认证方案 被引量:2

Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
下载PDF
导出
摘要 为了防止私人数据泄露并完善已有的移动网络匿名漫游认证方案,提出了一种利用椭圆曲线加密结合散列函数的移动网络匿名安全认证方案。该方案利用椭圆曲线加密,结合散列函数,以随机数代替公开密钥加密和时间戳。首先,使用外地代理(FA)的漫游服务之前,计算单向散列函数,移动用户(MU)使用本地代理(HA)注册。然后,建立认证和会话的密钥,采用椭圆曲线加密,若HA一直待在同一FA中,则MU可以用FA更新会话密钥。最后,MU通过公共信道,利用HA修改密码。性能和安全性分析表明,相比其他几种类似方案,提出的方案明显提高了效率和安全性。其中,虚拟计算时间只有2.000 85 s,显著降低了计算开销。 In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme, anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was proposed. With elliptic curve cryptography and hash functions, random numbers were used to replace public key encryption and time stamp. Firstly, before using the roaming services of a foreign agent(FA), hash function was calculated. A host agent(HA) was used by mobile user to register. Then,authentication and session key were set up with elliptic curve encryption. If HA is always in FA, MU can update the session key with FA. Finally, through a common channel, MU could utilize HA to change their passwords. The analysis of the performance and safety shows that, compared with other similar programs, the proposed scheme has significantly improved efficiency and safety. And the virtual computing time is only 2.000 85 seconds, which sharply reduces the cost of computing.
作者 陈跃辉 黄淼
出处 《电信科学》 北大核心 2016年第5期114-120,共7页 Telecommunications Science
关键词 移动网络 匿名安全认证 椭圆曲线加密 散列函数 假冒攻击 mobile network anonymous security authentication elliptic curve cryptography hash function impersonation attack
  • 相关文献

参考文献7

  • 1傅建庆,陈健,范容,陈小平,平玲娣.基于代理签名的移动通信网络匿名漫游认证协议[J].电子与信息学报,2011,33(1):156-162. 被引量:8
  • 2ZHU J,MA J.A new authentication scheme with anonymity for wireless environments[J].IEEE Transactions on Consumer Electronics,2004,50(1):231-235.
  • 3LEE C C,HWANG M S,LIAO I E.Security enhancement on a new authentication scheme with anonymity for wireless environments[J].IEEE Transactions on Industry Electronics,2006,53(5):1683-1687.
  • 4WU C C,LEE W B,TSAUR W.A secure authentication scheme with anonymity for wireless communications[J].IEEE Communications Letters,2008,12(10):722-723.
  • 5王崇霞,高美真,刘倩,周贤伟.混合云联合身份认证与密钥协商协议设计[J].电信科学,2014,30(4):95-99. 被引量:12
  • 6MUN H,HAN K,YAN S L,et al.Enhanced secure anonymous authentication scheme for roaming service in global mobility networks[J].Mathematical&Computer Modelling,2012,55(1-2):214-222.
  • 7KUMARI S,KHAN M K,LI X,et al.Design of a user anonymous password authentication scheme without smart card[J].International Journal of Communication Systems,2014,15(2):326-335.

二级参考文献34

  • 1朱建明,马建峰.一种高效的具有用户匿名性的无线认证协议[J].通信学报,2004,25(6):12-18. 被引量:13
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3彭华熹,冯登国.匿名无线认证协议的匿名性缺陷和改进[J].通信学报,2006,27(9):78-85. 被引量:26
  • 4Kesdogan D and Palmer C. Technical challenges of network anonymity[J]. Computer Communications, 2006, 29(3): 306-324.
  • 53GPP TS 33.102 V8.1.0. Policy and charging control architecture[S]. Release 8, 2008 -12.
  • 6Wu Chia-chun and Lee Wei-bin, et al.. A secure authentication scheme with anonymity for wireless communications[J]. IEEE Communications Letters, 2008, 12 (10): 722- 723.
  • 7Zhu Jian-ming and Ma Jian-feng. A new authentication scheme with anonymity for wireless environment[J]. IEEE Transactions on Consumer Electronic, 2004, 50(1): 231 -235.
  • 8Lee J S and Chang J H. Security flaw of authentication scheme with anonymity for wireless communications[J]. IEEE Communications Letters, 2009, 13(5): 292- 293.
  • 9Wong D S. Security analysis of two anonymous authentication protocols for distributed wireless networks[C] Third IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE, Hawaii, USA, 2005:284- 288.
  • 10Zeng Peng and Cao Zhen-fu, ct al.. On the anonymity of some authentication schemes for wireless communications[J]. IEEE Communications Letters, 2009, 13(3): 170 -171.

共引文献18

同被引文献21

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部