JIANG Chunlin, JIA Weijia, GU Ke, et al., “Anonymous Authentication without Home Server in Mobile Roaming Networks,” Chinese Journal of Electronics, vol. 22, no. 2, pp. 382-386, 2013,
Citation: JIANG Chunlin, JIA Weijia, GU Ke, et al., “Anonymous Authentication without Home Server in Mobile Roaming Networks,” Chinese Journal of Electronics, vol. 22, no. 2, pp. 382-386, 2013,

Anonymous Authentication without Home Server in Mobile Roaming Networks

Funds:  This work is supported by the CityU Applied R&D Center and Funding (No.9681001, No.9667052); the Shenzhen-HK Innovation Cycle Grant (No.ZYB200907080078A), the National Natural Science Foundation of China (No.61070222), the National S&T Major Project of China (No.2010ZX01036-001-001) and the R&D Program of Shenzhen (No.JC201005280585A).
  • Received Date: 2011-09-01
  • Rev Recd Date: 2012-03-01
  • Publish Date: 2013-04-25
  • In this paper, we propose an anonymous authentication protocol based on group signature under Canetti-Krawczyk (CK) model for mobile roaming networks. The protocol involves only a mobile user and the user's visited server, without the involvement of the user's home server until the user's identity (ID) needs to be revealed. In order to reduce the computational burden on the mobile terminals, the protocol gives a method that minimizes expensive pairing operations. Then, its performance as well as efficiency is analyzed. It is shown that the proposed protocol greatly reduces the average authentication latency while security and anonymity are still preserved. Therefore, it can be applicable in practical applications.
  • loading
  • T. Zhou, J. Xu, "Provable secure authentication protocol with anonymity for roaming service in global mobility networks", Computer Networks, Vol.55, No.1, pp.205-213, 2011.
    C. Tang, D.O. Wu, "Mobile privacy in wireless networksrevisited", IEEE Transactions on Wireless Communications, Vol.7, No.3, pp.1035-1042, 2008.
    W.B. Lee, C.K. Yeh, "A new delegation-based authentication protocol for use in portable communication systems", IEEE Transactions on Wireless Communications, Vol.4, No.1, pp.57- 64, 2005.
    C.S. Wan, A.Q. Hu, J. Zhang, "An elliptic curve based handoff authentication protocol for WLAN", Acta Electronica Sinica, Vol.39, No.1, pp.165-169, 2011. (in Chinese)
    K. Shum, V.K. Wei, "A strong proxy signature scheme with proxy signer privacy protection", Proc. of WETICE, Pittsburgh, Pennsylvania, USA, pp.55-56, 2002.
    J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, M. Meyerovich, "How to win the clonewars: efficient periodic n-times anonymous authentication", Proc. of ACM Conference on Computer and Communications Security, Alexandria, VA, USA, pp.201-210, 2006.
    G.M. Yang, Q. Huang, D.S. Wong, X.T. Deng, "Universal authentication protocols for anonymous wireless communications", IEEE Transactions on Wireless Communications, Vol.9, No.1, pp.168-174, 2010.
    R. Canetti, H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels (Full Version)", http://eprint.iacr.org/2001, 2001.
    M. Bellare, R. Canetti, H. Krawczyk, "A modular approach to the design and analysis of authentication and key exchange protocols", Proc. of ACM Symposium on Theory of Computing, Dallas, Texas, USA, pp.419-428, 1998.
    D. Johnson, A. Menezes, S.A. Vanstone, "The Elliptic curve digital signature algorithm (ECDSA)", International Journal of Information Security, Vol.1, No.1, pp.36-63, 2001.
    D. Boneh, H. Shacham, "Group signatures with verifier-local revocation", Proc. of ACM Conference on Computer and Communications Security, Washington, DC, USA, pp.168-177, 2004.
    K. Lauter, "The advantages of elliptic curve cryptography for wireless security", IEEE Wireless Communication, Vol.11, No.1, pp.62-67, 2004.
    J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway, "UMAC: Fast and secure message authentication", Proc. of CRYPTO, Santa Barbara, California, USA, pp.216-233, 1999.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (616) PDF downloads(1479) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return