Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks

被引:48
|
作者
Cao, Xuefei [1 ]
Zeng, Xingwen [2 ,3 ]
Kou, Weidong [4 ]
Hu, Liangbing [5 ]
机构
[1] China Mobile Res Inst, Dept Terminal Technol, SIM Lab, Beijing 100053, Peoples R China
[2] Xidian Univ, Acad Amd Sect, Xian 710071, Peoples R China
[3] Xidian Univ, Coll Telecommun, Xian 710071, Peoples R China
[4] IBM China, IBM Software Grp, Beijing 100094, Peoples R China
[5] Xidian Univ, Natl Key Lab Radar Signal Proc, Xian 710071, Peoples R China
关键词
Anonymity; identity-based; nonrepudiation; pairing; remote authentication; SCHEME; SIGNATURES;
D O I
10.1109/TVT.2009.2012389
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Based on identity-based cryptography, this paper proposes a remote authentication protocol featured with client anonymity, nonrepudiation, and improved efficiency for value-added services in a mobile environment. First, an identity-based signature scheme is proposed, and the verification result of the signature is a constant with respect to the signer's identifier. Then, a remote authentication protocol is constructed by combining the proposed signature scheme with a new concept called the client account index, which helps to realize client anonymity with no encryption operations. A formal proof and a theoretical analysis are provided to show the security strength of the proposals. Performance evaluation shows that compared with previous identity-based remote authentication schemes, the new protocol reduces at least 21.7% of the overall running time with stronger security; the reductions in the overall running time and signaling traffic reach 31.9% and 82.0%, respectively, compared with previous Rivest-Shamir-Adleman-based schemes.
引用
收藏
页码:3508 / 3517
页数:10
相关论文
共 50 条
  • [31] Secure Dynamic Identity-Based Remote User Authentication Scheme
    Sood, Sandeep K.
    Sarje, Anil K.
    Singh, Kuldip
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2010, 5966 : 224 - 235
  • [32] Identity-based deniable authentication for ad hoc networks
    Li, Fagen
    Xiong, Pan
    Jin, Chunhua
    COMPUTING, 2014, 96 (09) : 843 - 853
  • [33] Value-Added Radiology Services
    Kalra, Naveen
    Khandelwal, Niranjan
    JOURNAL OF THE AMERICAN COLLEGE OF RADIOLOGY, 2012, 9 (01) : 84 - 85
  • [34] A web services based value-added services integrated platform
    Lin, N
    Yu, HH
    Wang, GX
    ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1347 - 1354
  • [35] Extended 3PAKE authentication scheme for value-added services in VANETs
    Muthumeenakshi, R.
    Reshmi, T. R.
    Murugan, K.
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 27 - 38
  • [36] Group management in value-added services over IMS networks
    Universidad Politécnica de Madrid, Madrid, Spain
    IEEE. Lat. Am. Trans., 2 (120-126):
  • [37] Group Management in Value-Added Services Over IMS Networks
    Capelastegui, P.
    Hernandez, A.
    Gonzalez, F.
    Vazquez, E.
    Navarro, J.
    Siguero, N.
    IEEE LATIN AMERICA TRANSACTIONS, 2010, 8 (02) : 120 - 126
  • [38] On the Security of an Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in VANETs
    Wang, Huaqun
    Zhang, Yuqing
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 1735 - 1739
  • [39] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375
  • [40] The facilitating role of smartphones in increasing use of value-added mobile services
    Tojib, Dewi
    Tsarenko, Yelena
    Sembada, Agung Y.
    NEW MEDIA & SOCIETY, 2015, 17 (08) : 1220 - 1240