Anonymous roaming authentication protocol for wireless network with backward unlinkability and natural revocation

被引:0
|
作者
Mohit Gupta
Narendra S. Chaudhari
机构
[1] VNIT,Department of Computer Science, Engineering
来源
关键词
Anonymous; Untraceability; Authentication; Roaming; Revocation; Wireless network;
D O I
暂无
中图分类号
学科分类号
摘要
An anonymous secure roaming authentication protocol can be used in wireless network for authentication between a mobile device and a foreign server when the mobile device is away from its home network and wants to use the services of the foreign network. In a two-party roaming authentication protocol, a mobile user and a foreign server authenticate each other without the active help of the home server. Group signature-based protocols are the obvious choice for the design of two-party protocol due to inherent anonymous nature of group signature. Among the existing group signature-based roaming authentication protocols, only the protocol of Liu et al. supports natural revocation without periodic updates of the master public key at the mobile user and foreign server, but it does not support backward unlinkability. Therefore, we propose a two-party anonymous roaming authentication protocol in which the mobile user supports natural revocation along with backward unlinkability without periodic updates of either public key or private key. In addition, the proposed protocol is provably secure in the random oracle model.
引用
收藏
页码:175 / 184
页数:9
相关论文
共 50 条
  • [41] A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications
    Guangsong Li
    Yongbin Zeng
    Hui Guang
    Gang Yu
    Wireless Personal Communications, 2020, 114 : 2613 - 2627
  • [42] A Lightweight Anonymous Authentication Protocol Based on Shared Key in Wireless Networks
    Zhong C.
    Li X.-H.
    Song Y.-Y.
    Ma J.-F.
    Li, Xing-Hua (xhli1@mail.xidian.edu.cn), 2018, Science Press (41): : 1157 - 1171
  • [43] A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications
    Li, Guangsong
    Zeng, Yongbin
    Guang, Hui
    Yu, Gang
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (03) : 2613 - 2627
  • [44] Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks
    Zeng, Yongbin
    Guang, Hui
    Li, Guangsong
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [45] Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications
    Lee, Cheng-Chi
    Lin, Tsung-Hung
    Tsai, Chwei-Shyong
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1375 - 1378
  • [46] Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network
    Xie, Qi
    Hu, Bin
    Tan, Xiao
    Bao, Mengjie
    Yu, Xiuyuan
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 601 - 614
  • [47] An Anonymous Authentication System in Wireless Networks Using Verifier-Local Revocation Group Signature Scheme
    Sudarsono, Amang
    Al Rasyid, M. Udin Ilarun
    2016 INTERNATIONAL SEMINAR ON INTELLIGENT TECHNOLOGY AND ITS APPLICATIONS (ISITIA): RECENT TRENDS IN INTELLIGENT COMPUTATIONAL TECHNOLOGIES FOR SUSTAINABLE ENERGY, 2016, : 49 - 54
  • [48] A secure three-factor anonymous roaming authentication protocol using ECC for space information networks
    Guo, Junyan
    Du, Ye
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (02) : 898 - 916
  • [49] A secure three-factor anonymous roaming authentication protocol using ECC for space information networks
    Junyan Guo
    Ye Du
    Peer-to-Peer Networking and Applications, 2021, 14 : 898 - 916
  • [50] Robust Anonymous Two-Factor Authentication Scheme for Roaming Service in Global Mobility Network
    Qi Xie
    Bin Hu
    Xiao Tan
    Mengjie Bao
    Xiuyuan Yu
    Wireless Personal Communications, 2014, 74 : 601 - 614