Anonymous authentication scheme of trusted mobile terminal under mobile Internet

被引:0
|
作者
ZHANG De-dong [1 ,2 ]
MA Zhao-feng [1 ,2 ]
NIU Xin-xin [1 ,2 ]
Peng Yong [3 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications
[2] National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications
[3] China Information Technology Security Evaluation Center
基金
中国国家自然科学基金;
关键词
trusted platform module; anonymous authentication; strong RSA assumption; remote attestation;
D O I
暂无
中图分类号
TP393.01 []; TN929.5 [移动通信];
学科分类号
080402 ; 080904 ; 0810 ; 081001 ; 081201 ; 1201 ;
摘要
In order to solve the contradictions between user privacy protection and identity authentication, an anonymous authentication scheme under mobile Internet is proposed, which is based on the direct anonymous attestation of trusted computing and uses the encrypting transfer and signature validation for its implementation. Aiming at two access mode of trusted mobile terminal under mobile Internet, self access and cross-domain access, the authentication process of each mode is described in details. The analysis shows that the scheme implements anonymous authentication on mobile Internet and is correct, controllable and unforgeable.
引用
收藏
页码:58 / 65
页数:8
相关论文
共 50 条
  • [1] Anonymous authentication scheme of trusted mobile terminal under mobile Internet
    ZHANG Dedong
    MA Zhaofeng
    NIU Xinxin
    Peng Yong
    [J]. The Journal of China Universities of Posts and Telecommunications., 2013, 20 (01) - 65
  • [2] An anonymous authentication scheme for mobile communication
    Liu Jin-ye
    Gu Li-ze
    Luo Shou-shan
    Yang Yi-xian
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 359 - +
  • [3] A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform
    Yang, Bo
    Feng, Dengguo
    Qin, Yu
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 9 - 17
  • [4] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [5] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [6] Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing
    Shi, Yang
    Zhang, Qing
    Liang, Jingwen
    He, Zongjian
    Fan, Hongfei
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2918 - 2929
  • [7] A Secured and Efficient Anonymous Roaming Scheme of Mobile Internet
    Cheng, Yao
    Yue, Li
    Duan, Naixia
    Li, Chenglong
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [8] A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid
    Yang, Bin
    Xu, Guangquan
    Zeng, Xianjiao
    Liu, Jia
    Zhang, Yao
    [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 821 - 827
  • [9] Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments
    Lee, Hakjun
    Ryu, Jihyeon
    Won, Dongho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5798 - 5815
  • [10] Anonymous and expeditious mobile user authentication scheme for GLOMONET environments
    Gope, Prosanta
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    Vijayakumar, Pandi
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (02)