期刊文献+

无线漫游认证中可证安全的无证书聚合签名方案 被引量:3

Provably secure certificateless aggregate signature scheme in wireless roaming authentication
下载PDF
导出
摘要 无证书聚合签名在实现批验证的同时解决了证书管理和密钥托管问题,在资源受限的无线移动网络中得到广泛应用。首先对一个无线匿名漫游认证方案中的无证书聚合签名进行了安全性分析,指出该方案不能抵抗签名伪造攻击,并提出了一种新的安全高效的无证书聚合签名方案。新方案不需要双线性对操作,在随机预言机模型下证明方案是安全的。与原方案相比,所提方案在提高安全性的同时大大降低了计算开销。 Certificateless aggregate signature(CLAS)schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was shown that a certificateless aggregate signature in an anonymous roaming authentication scheme was vulnerable to the signature forge attack.To address the issue,a new secure and efficient certificateless aggregate signature scheme was presented,which required no bilinear pairing operations.And then the security of the scheme under the ECDLP assumption in the random oracle model was proved.Finally the performance of proposed scheme was evaluated.Compared with the original scheme,the proposal is more secure and the total computational cost is greatly reduced.
作者 许芷岩 吴黎兵 李莉 何德彪 XU Zhi-yan;WU Li-bing;LI Li;HE De-biao(Computer School, Wuhan University, Wuhan 430072, China;College of Computer, Hubei University of Education, Wuhan 430205, China;International School of Software , Wuhan University, Wuhan 430072, China;State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, China)
出处 《通信学报》 EI CSCD 北大核心 2017年第7期123-130,共8页 Journal on Communications
基金 国家自然科学基金资助项目(No.61501333 No.61572379 No.61472287) 湖北省自然科学基金资助项目(No.2015CFA068) 武汉市科技计划基金资助项目(No.2016060101010047)~~
关键词 可证安全 无证书 聚合签名 抗伪造攻击 provably secure certificateless aggregate signature resist forgery attack
  • 相关文献

参考文献1

二级参考文献41

  • 1田子建,王继林,伍云霞.一个动态的可追踪匿名认证方案[J].电子与信息学报,2005,27(11):1737-1740. 被引量:10
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3TZENG Z J, TZENG W G. Authentication of mobile users in third generation mobile systems[J]. Wireless Personal Communications, 2001, 16(1): 35-50.
  • 4HWANG K F, CHANG C C. A self-encryption mechanism for au- thentication of roaming and teleconference services[J]. IEEE Transac- tions on Wireless Communications, 2003, 2(2): 400-407.
  • 5JIANG Y, LIN C, SHEN X, et al. Mutual authentication and key exchange protocols for roaming services in wireless mobile net- works[J]. IEEE Transactions on Wireless Communications, 2006, 5(9): 2569-2577.
  • 6ARKKO J, HAVERINEN H. Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA)[J]. Heise Zeitchriften Veriag, 2006, 47(2): 64-77.
  • 7CHANG C C, LEE C Y, CHIU Y C. Enhanced authentication scheme with anonymity for roaming service in global mobility networks[J]. Computer Communications, 2009, 32(4): 611-618.
  • 8ZHOU T, XU J. Provable secure authentication protocol with ano- nymity for roaming service in global mobility networks[J]. Computer Networks, 2011, 55(1): 205-213.
  • 9GO J, PARK J, KIM K. Wireless authentication protocol preserving user anonymity[J]. Authentication, 2001, 3(2): 78-8 1.
  • 10HE D, MA M, ZHANG Y, et al. A strong user authentication scheme with smart cards for wireless communications[J]. Computer Commu- nications, 2011, 34(3): 367-374.

共引文献7

同被引文献21

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部