Efficient authentication protocol with anonymity and key protection for mobile Internet users

被引:4
|
作者
Jiang, Yan [1 ]
Zhu, Youwen [1 ,3 ,4 ]
Wang, Jian [1 ]
Xiang, Yong [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
[3] Collaborat Innovat Ctr Novel Software Technol & I, Nanjing 210023, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
关键词
Anonymity; Key protection; Zero-knowledge protocols; Mobile Internet; SIGNATURES; SECURITY;
D O I
10.1016/j.jpdc.2019.11.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To preserve user privacy and guarantee data confidentiality on the mobile Internet, it is crucial to secure communication between the mobile devices held by users and a remote server. In real applications, a serious threat against communication security is exposure of secret keys, due to the compromise of the mobile devices storing the key. One method of preserving key exposure is to use protected hardware or smart-cards, but they are costly and impractical. Another method is to utilize secret sharing to share secret key across multiple devices. Nevertheless, secret sharing schemes guarantee security only if the adversary cannot access at least one share in its entirety. In this paper, we present a remote authentication protocol, which resists key exposure. Further, we present a zero-knowledge protocol based on SDH assumption that can achieve anonymity. We formally prove our proposed solution is secure under the decision linear assumption and the q s -mSDH assumption in the random oracle model. Finally, we show our solution can achieve higher efficiency and stronger anonymity comparing with existing schemes, and thus the proposed solution is more suitable for real-world environments. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:179 / 191
页数:13
相关论文
共 50 条
  • [31] A new efficient authentication protocol for mobile networks
    Hwang, Ren-Junn
    Su, Feng-Fu
    [J]. Comput Stand Interfaces, 2 (241-252):
  • [32] Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    Hu, Bin
    Wong, Duncan S.
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 124 - 129
  • [33] A new efficient authentication protocol for mobile networks
    Hwang, RJ
    Su, FF
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 28 (02) : 241 - 252
  • [34] SAK-AKA: A Secure Anonymity Key of Authentication and Key Agreement protocol for LTE network
    Nashwan, Shadi
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2017, 14 (05) : 790 - 801
  • [35] An anonymity-preserving mobile user authentication protocol for global roaming services
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    [J]. COMPUTER NETWORKS, 2023, 221
  • [36] Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    Park, CS
    [J]. COMPUTER NETWORKS, 2004, 44 (02) : 267 - 273
  • [37] Secure Key Agreement and Key Protection for Mobile Device User Authentication
    Wu, Libing
    Wang, Jing
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 319 - 330
  • [38] IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups
    Aboudagga, Nidal
    de Meulenaer, Giacomo
    Eltoweissy, Mohamed
    Quisquater, Jean-Jacques
    [J]. 2009 IEEE 34TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2009), 2009, : 30 - +
  • [39] Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment
    Park, KiSung
    Lee, KyungKeun
    Park, YoungHo
    [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 72 - 73
  • [40] Secure and efficient roaming authentication protocol with controllable anonymity for heterogeneous wireless network
    Zhou, Yan-Wei
    Yang, Bo
    Zhang, Wen-Zheng
    [J]. Ruan Jian Xue Bao/Journal of Software, 2016, 27 (02): : 451 - 465