An anonymous authentication scheme for mobile communication

被引:0
|
作者
Liu Jin-ye [1 ]
Gu Li-ze [2 ]
Luo Shou-shan [1 ]
Yang Yi-xian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100088, Peoples R China
[2] Beijing Univ Posts & Telecommun, Key Lab network & informat attack & def tech MOE, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
authentication; anonymous; mobile computing; privacy protecting;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to enable mobile network to provide anonymity services, ensure the confidentiality of the user's identity, whereabouts and other information, we raised an anonymous authentication scheme. The scheme solves the problem of user's anonymity not only in roaming network, but also in adscription network. The scheme bases on binary tree theory and the knowledge proof, and combines divisible e-cash theory to implement. Theoretical analysis and experimental results demonstrate using the scheme can provide users for anonymity service not only in roaming network, but also in adscription network.
引用
收藏
页码:359 / +
页数:2
相关论文
共 50 条
  • [21] Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks
    Xie, Qi
    Tang, Zhixiong
    Chen, Kefei
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 218 - 230
  • [22] Practical blacklist-based anonymous authentication scheme for mobile crowd sensing
    Hongwei Li
    Kun Jia
    Haomiao Yang
    Dongxiao Liu
    Liang Zhou
    [J]. Peer-to-Peer Networking and Applications, 2016, 9 : 762 - 773
  • [23] A novel blockchain-based anonymous handover authentication scheme in mobile networks
    Hu, ChenCheng
    Zheng, Dong
    Guo, Rui
    Wu, AXin
    Wang, Liang
    Gao, ShiYao
    [J]. International Journal of Network Security, 2020, 22 (05) : 874 - 884
  • [24] Practical blacklist-based anonymous authentication scheme for mobile crowd sensing
    Li, Hongwei
    Jia, Kun
    Yang, Haomiao
    Liu, Dongxiao
    Zhou, Liang
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (04) : 762 - 773
  • [25] Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks
    Rahman, Sk Md Mizanur
    Nasser, Nidal
    Inomata, Atsuo
    Okamoto, Takeshi
    Mambo, Masahiro
    Okamoto, Eiji
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (02) : 179 - 189
  • [26] Anonymous authentication scheme for subscription services
    Fujii, Arisa
    Ohtake, Go
    Hanaoka, Goichiro
    Ogawa, Kazuto
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT III, PROCEEDINGS, 2007, 4694 : 975 - +
  • [27] Anonymous Identity Authentication Scheme for VANETs
    Sun, Mei
    Zhang, Juan
    Guo, Yuyan
    [J]. JOURNAL OF COASTAL RESEARCH, 2020, : 203 - 209
  • [28] An anonymous authentication scheme for identification card
    Ge, He
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 238 - 248
  • [29] A simple and efficient authentication scheme for mobile satellite communication systems
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chang, Rui-Xiang
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2012, 30 (01) : 29 - 38
  • [30] An enhanced dynamic authentication scheme for mobile satellite communication systems
    Chen, Yulei
    Chen, Jianhua
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2021, 39 (03) : 250 - 262