浏览全部资源
扫码关注微信
安徽大学计算机科学与技术学院,安徽 合肥 230601
[ "刘丹(1991-),女,安徽马鞍山人,安徽大学硕士生,主要研究方向为网络与信息安全。" ]
[ "石润华(1974-),男,安徽安庆人,安徽大学教授、博士生导师,主要研究方向为无线网络安全、保护隐私的多方协作计算、可证明安全的量子密码。" ]
[ "张顺(1982-),男,安徽安庆人,安徽大学副教授、硕士生导师,主要研究方向为信息计算复杂性、高振荡问题易处理性和量子计算。" ]
[ "仲红(1965-),女,安徽固镇人,安徽大学教授、博士生导师,主要研究方向为无线传感网、安全多方计算、私有信息保护。" ]
网络出版日期:2016-07,
纸质出版日期:2016-07-25
移动端阅览
刘丹, 石润华, 张顺, 等. 无线网络中基于无证书聚合签名的高效匿名漫游认证方案[J]. 通信学报, 2016,37(7):182-192.
Dan LIU, Run-hua SHI, Shun ZHANG, et al. Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network[J]. Journal of communications, 2016, 37(7): 182-192.
刘丹, 石润华, 张顺, 等. 无线网络中基于无证书聚合签名的高效匿名漫游认证方案[J]. 通信学报, 2016,37(7):182-192. DOI: 10.11959/j.issn.1000-436x.2016147.
Dan LIU, Run-hua SHI, Shun ZHANG, et al. Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network[J]. Journal of communications, 2016, 37(7): 182-192. DOI: 10.11959/j.issn.1000-436x.2016147.
针对无线移动网络漫游认证中的隐私保护需求,提出了新的匿名漫游认证方案。引入在线离线签名技术,并巧妙结合聚合验证方法,设计了一个无证书聚合签名方案。与相关方案相比,该签名方案降低了签名和验证过程的计算开销,提高了通信效率。继而,基于该签名方案,提出了一种新型高效的匿名漫游认证方案,简化了传统的三方漫游认证模型。理论分析结果表明,该方案安全、有效,特别适用于大规模无线移动网络。
To solve the privacy-preserving problem during the roaming authentication of wireless mobile networks
a novel roaming authentication scheme with anonymity was presented. An efficient certificateless aggregate signature scheme was first constructed
by introducing the online/offline signature and combining the aggregate signature. Com-pared with the related schemes
the proposed scheme has higher efficiency in computations of both signature and verifi-cation
and also improves the efficiency in communications. Furthermore
based on the proposed signature scheme
a novel roaming authentication scheme with anonymity was presented
in which it simplified the traditional three-party au-thentication model. The theoretical analysis shows that this scheme is secure and effective
and thus it is especially suit-able for large-scale wireless mobile networks.
TZENG Z J , TZENG W G . Authentication of mobile users in third generation mobile systems [J ] . Wireless Personal Communications , 2001 , 16 ( 1 ): 35 - 50 .
HWANG K F , CHANG C C . A self-encryption mechanism for au-thentication of roaming and teleconference services [J ] . IEEE Transactions on Wireless Communications , 2003 , 2 ( 2 ): 400 - 407 .
JIANG Y , LIN C , SHEN X , et al . Mutual authentication and key exchange protocols for roaming services in wireless mobile net-works [J ] . IEEE Transactions on Wireless Communications , 2006 , 5 ( 9 ): 2569 - 2577 .
ARKKO J , HAVERINEN H . Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA) [J ] . Heise Zeitchriften Veriag , 2006 , 47 ( 2 ): 64 - 77 .
CHANG C C , LEE C Y , CHIU Y C . Enhanced authentication scheme with anonymity for roaming service in global mobility networks [J ] . Computer Communications , 2009 , 32 ( 4 ): 611 - 618 .
ZHOU T , XU J . Provable secure authentication protocol with ano-nymity for roaming service in global mobility networks [J ] . Computer Networks , 2011 , 55 ( 1 ): 205 - 213 .
GO J , PARK J , KIM K . Wireless authentication protocol preserving user anonymity [J ] . Authentication , 2001 , 3 ( 2 ): 78 - 81 .
HE D , MA M , ZHANG Y , et al . A strong user authentication scheme with smart cards for wireless communications [J ] . Computer Communications , 2011 , 34 ( 3 ): 367 - 374 .
REN K , LOU W , KIM K , et al . A novel privacy preserving authenti-cation and access control scheme for pervasive computing environments [J ] . IEEE Transactions on Vehicular Technology , 2006 , 55 ( 4 ): 1373 - 1384 .
TREVATHAN J , GHODOSI H , READ W . An anonymous and secure continuous double auction scheme [C ] // The 39th Annual Hawaii International Conference on System Sciences .IEEE, c 2006 : 125 .
KIM J , CHOI S , KIM K , et al . Anonymous authentication protocol for dynamic groups with power-limited devices [C ] // Symposium on Cryptography and Information Security (SCIS'03) . c 2013 : 405 - 410 .
YANG G , WONG D S , DENG X . Anonymous and authenticated key exchange for roaming networks [J ] . IEEE Transactions on Wireless Communications , 2007 , 6 ( 9 ): 3461 - 3472 .
YANG G , WONG D S , DENG X . Formal security definition and efficient construction for roaming with a privacy-preserving extension [J ] . JUCS , 2008 , 14 ( 3 ): 441 - 462 .
彭华熹 . 一种基于身份的多信任域认证模型 [J ] . 计算机学报 , 2006 , 29 ( 8 ): 1271 - 1281 .
PENG H X . An identity-based authentication model for multi-domain [J ] . Chinese Journal of Computers , 2006 , 29 ( 8 ): 1271 - 1281 .
WAN Z , REN K , PRENEEL B . A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks [C ] // The first ACM Conference on Wireless Network Security .ACM, c 2008 : 62 - 67 .
FATEMI M , SALIMI S , SALAHI A . Anonymous roaming in univer-sal mobile telecommunication system mobile networks [J ] . IET Information Security , 2010 , 4 ( 2 ): 93 - 103 .
YANG G , HUANG Q , WONG D S , et al . Universal authentication protocols for anonymous wireless communications [J ] . IEEE Transactions on Wireless Communications , 2010 , 9 ( 1 ): 168 - 174 .
田子建 , 王继林 , 伍云霞 . 一个动态的可追踪匿名认证方案 [J ] . 电子与信息学报 , 2005 , 27 ( 11 ): 1737 - 1740 .
CAO C L , LIU M Q , ZHANG R . Provably secure authenticated key agreement protocol based on hierarchical identity [J ] . Journal of Electronics & Information Technology , 2005 , 27 ( 11 ): 1737 - 1740 .
HOU H , LIU S . CPK-based authentication and key agreement protocols with anonymity for wireless network [C ] // 2009 International Con-ference on Multimedia Information Networking and Security .IEEE, c 2009 : 347 - 350 .
ZHANG M , PEI C , DANG L . An efficient certificateless registration protocol for mobile IP networks [J ] . Journal of Convergence Information Technology , 2012 , 7 ( 23 ): 34 - 41 .
HE D , BU J , CHAN S , et al . Privacy-preserving universal authentica-tion protocol for wireless communications [J ] . IEEE Transactions on Wireless Communications , 2011 , 10 ( 2 ): 431 - 436 .
HE D , CHEN C , CHAN S , et al . Secure and efficient handover au-thentication based on bilinear pairing functions [J ] . IEEE Transactions on Wireless Communications , 2012 , 11 ( 1 ): 48 - 53 .
HE D , CHEN C , CHAN S , et al . Analysis and improvement of a se-cure and efficient handover authentication for wireless networks [J ] . Communications Letters, IEEE , 2012 , 16 ( 8 ): 1270 - 1273 .
TSAI J L , LO N W , WU T C . Secure handover authentication protocol based on bilinear pairings [J ] . Wireless Personal Communications , 2013 , 73 ( 3 ): 1037 - 1047 .
KIM J S , KWAK J . Improved secure anonymous authentication scheme for roaming service in global mobility networks [J ] . International Journal of Security and Its Applications , 2012 , 6 ( 3 ): 45 - 54 .
KUO W C , WEI H J , CHENG J C . Enhanced secure authentication scheme with anonymity for roaming in mobility networks [J ] . Information Technology and Control , 2014 , 43 ( 2 ): 151 - 156 .
ZHANG Y , WANG C . Comment on new construction of efficient certificateless aggregate signatures [J ] . International Journal of Security and Its Applications , 2015 , 9 ( 1 ): 147 - 154 .
CHENG L , WEN Q , JIN Z , et al . Cryptanalysis and improvement of a certificateless aggregate signature scheme [J ] . Information Sciences , 2015 , 295 : 337 - 346 .
CHEN Y C , TSO R , HORNG G , et al . Strongly secure certificateless signature: cryptanalysis and improvement of two schemes [J ] . Journal of Information Science and Engineering , 2015 , 31 ( 1 ): 297 - 314 .
HUANG X , MU Y , SUSILO W , et al . Certificateless signature revisited [C ] // Information Security and Privacy .Springer Berlin Heidelberg, c 2007 : 308 - 322 .
GONG Z , LONG Y , HONG X , et al . Two certificateless aggregate signatures from bilinear maps [C ] // Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing , c 2007 : 188 - 193 .
ZHANG L , ZHANG F . A new certificateless aggregate signature scheme [J ] . Computer Communications , 2009 , 32 ( 6 ): 1079 - 1085 .
ZHANG L , QIN B , WU Q , et al . Efficient many-to-one authentication with certificateless aggregate signatures [J ] . Computer Networks , 2010 , 54 ( 14 ): 2482 - 2491 .
XIONG H , WU Q , CHEN Z . Strong security enabled certificateless aggregate signatures applicable to mobile computation [C ] // 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS) .IEEE, c 2011 : 92 - 99 .
XIONG H , WU Q , CHEN Z . An efficient provably secure certificate-less aggregate signature applicable to mobile computation [J ] . Control and Cybernetics , 2012 , 41 ( 2 ): 373 - 391 .
CHEN Y C , HORNG G , LIU C L , et al . Efficient certificateless ag-gregate signature scheme [J ] . Journal Electronic Science and Technology , 2012 , 10 : 209 - 214 .
XIONG H , GUAN Z , CHEN Z , et al . An efficient certificateless ag-gregate signature with constant pairing computations [J ] . Information Sciences , 2013 , 219 ( 10 ): 225 - 235 .
LIU H , WANG S , LIANG M , et al . New construction of efficient certificateless aggregate signatures [J ] . International Journal of Security and Its Applications , 2014 , 8 : 411 - 422 .
TU H , HE D , HUANG B . Reattack of a certificateless aggregate sig-nature scheme with constant pairing computations [J ] . The Scientific World Journal , 2014 , 2014 ( 9-10 ): 343715 .
刘贺 . 移动网络接入认证的隐私保护研究 [D ] . 北京:北京交通大学 , 2014 .
LIU H . Research on privacy protection in access authentication for mobile networks [D ] . Beijing: Beijing Jiaotong University , 2014 .
0
浏览量
622
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构