Practical deniable authentication for pervasive computing environments

被引:16
|
作者
Li, Fagen [1 ]
Hong, Jiaojiao [1 ]
Omala, Anyembe Andrew [1 ]
机构
[1] Univ Elect Sci & Technol China, Ctr Cyber Secur, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
Pervasive computing; Security; Authentication; Deniable authentication; Heterogeneity; PRIVACY-PRESERVING AUTHENTICATION; ACCESS-CONTROL SCHEME; EFFICIENT; NETWORKS; SECURITY; PROTOCOL; SYSTEMS;
D O I
10.1007/s11276-016-1317-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two heterogeneous deniable authentication protocols for pervasive computing environments using bilinear pairings. The first protocol allows a sender in a public key infrastructure (PKI) environment to send a message to a receiver in an identity-based cryptography (IBC) environment. The second protocol allows a sender in the IBC environment to send a message to a receiver in the PKI environment. Our protocols admits formal security proof in the random oracle model under the bilinear Diffie-Hellman assumption. In addition, our protocols support batch verification that can speed up the verification of authenticators. The characteristic makes our protocols useful in pervasive computing environments.
引用
收藏
页码:139 / 149
页数:11
相关论文
共 50 条
  • [1] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    [J]. Wireless Networks, 2018, 24 : 139 - 149
  • [2] CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment
    Ahene, Emmanuel
    Guan, Yuanfeng
    Zhang, Zhiwei
    Li, Fagen
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 67 - 83
  • [3] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [4] The master key: A private authentication approach for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    [J]. PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +
  • [5] A Practical Approach to Partition Applications in Pervasive Computing Environments
    Jungum, Nevin Vunka
    Mohamudally, Nawaz
    Nissanke, Nimal
    [J]. 10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 : 74 - 81
  • [6] Authentication for pervasive computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
  • [7] Fair authentication in pervasive computing
    Li, Jun
    Christianson, Bruce
    Loomes, Martin
    [J]. SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143
  • [8] An authentication protocol for pervasive computing
    Li, SQ
    Zhou, JY
    Li, XX
    Chen, KF
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 553 - 563
  • [9] A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS
    Yao Lin Kong Xiangwei Wu Guowei Fan Qingna Lin Chi(School of Electronics & Information Engineering
    [J]. Journal of Electronics(China), 2010, 27 (01) : 68 - 78
  • [10] A novel privacy preserving authentication and access control scheme for pervasive computing environments
    Ren, Kui
    Lou, Wenjing
    Kim, Kwangjo
    Deng, Robert
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1373 - 1384