Efficient authentication protocol with anonymity and key protection for mobile Internet users

被引:4
|
作者
Jiang, Yan [1 ]
Zhu, Youwen [1 ,3 ,4 ]
Wang, Jian [1 ]
Xiang, Yong [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
[3] Collaborat Innovat Ctr Novel Software Technol & I, Nanjing 210023, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
关键词
Anonymity; Key protection; Zero-knowledge protocols; Mobile Internet; SIGNATURES; SECURITY;
D O I
10.1016/j.jpdc.2019.11.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To preserve user privacy and guarantee data confidentiality on the mobile Internet, it is crucial to secure communication between the mobile devices held by users and a remote server. In real applications, a serious threat against communication security is exposure of secret keys, due to the compromise of the mobile devices storing the key. One method of preserving key exposure is to use protected hardware or smart-cards, but they are costly and impractical. Another method is to utilize secret sharing to share secret key across multiple devices. Nevertheless, secret sharing schemes guarantee security only if the adversary cannot access at least one share in its entirety. In this paper, we present a remote authentication protocol, which resists key exposure. Further, we present a zero-knowledge protocol based on SDH assumption that can achieve anonymity. We formally prove our proposed solution is secure under the decision linear assumption and the q s -mSDH assumption in the random oracle model. Finally, we show our solution can achieve higher efficiency and stronger anonymity comparing with existing schemes, and thus the proposed solution is more suitable for real-world environments. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:179 / 191
页数:13
相关论文
共 50 条
  • [1] An Efficient Authentication Protocol with User Anonymity for Mobile Networks
    Li, Huixian
    Yang, Yafang
    Pang, Liaojun
    [J]. 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1842 - 1847
  • [2] An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 319 - 325
  • [3] Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles
    Zhang, Haibo
    Lan, Kai
    Chen, Zhou
    Wang, Ruyan
    Zou, Can
    Wang, Mingyue
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (06): : 103 - 116
  • [4] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Wu, Libing
    Zhang, Yubo
    Xie, Yong
    Alelaiw, Abdulhameed
    Shen, Jian
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3371 - 3387
  • [5] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Libing Wu
    Yubo Zhang
    Yong Xie
    Abdulhameed Alelaiw
    Jian Shen
    [J]. Wireless Personal Communications, 2017, 94 : 3371 - 3387
  • [6] Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
    Ding, Yan
    Zhou, Xian-wei
    Cheng, Zhi-mi
    Zeng, Wen-lu
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (04) : 1473 - 1485
  • [7] Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks
    Yan Ding
    Xian-wei Zhou
    Zhi-mi Cheng
    Wen-lu Zeng
    [J]. Wireless Personal Communications, 2013, 70 : 1473 - 1485
  • [8] Provably Secure Distributed Efficient Edge Authentication Protocol with Anonymity in Internet of Vehicles
    Zhang, Haibo
    Lan, Kai
    Huang, Hongwu
    Wang, Ruyan
    Zou, Can
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (08) : 2902 - 2910
  • [9] A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT
    He, Daojing
    Cai, Yanchang
    Zhu, Shanshan
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (11) : 7862 - 7872
  • [10] A robust protocol for authentication of mobile users
    El-Fishway, N
    Nofal, M
    Tadros, A
    [J]. 2002 IEEE PROCEEDINGS OF THE NINETEENTH NATIONAL RADIO SCIENCE CONFERENCE, VOLS 1 AND 2, 2002, : 255 - 261