通信学报 ›› 2016, Vol. 37 ›› Issue (7): 182-192.doi: 10.11959/j.issn.1000-436x.2016147
刘丹,石润华,张顺,仲红
出版日期:
2016-07-25
发布日期:
2016-07-28
基金资助:
Dan LIU,Run-hua SHI,Shun ZHANG,Hong ZHONG
Online:
2016-07-25
Published:
2016-07-28
Supported by:
摘要:
针对无线移动网络漫游认证中的隐私保护需求,提出了新的匿名漫游认证方案。引入在线离线签名技术,并巧妙结合聚合验证方法,设计了一个无证书聚合签名方案。与相关方案相比,该签名方案降低了签名和验证过程的计算开销,提高了通信效率。继而,基于该签名方案,提出了一种新型高效的匿名漫游认证方案,简化了传统的三方漫游认证模型。理论分析结果表明,该方案安全、有效,特别适用于大规模无线移动网络。
刘丹,石润华,张顺,仲红. 无线网络中基于无证书聚合签名的高效匿名漫游认证方案[J]. 通信学报, 2016, 37(7): 182-192.
Dan LIU,Run-hua SHI,Shun ZHANG,Hong ZHONG. Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network[J]. Journal on Communications, 2016, 37(7): 182-192.
表1
安全性和通信代价对比"
方案 | 第1类 | 第2类 | 公钥长度 | 聚合签名长度 | |||||||
B1 | B2 | B3 | 安全性 | B1 | B2 | B3 | 安全性 | ||||
文献[ | √ | W | √ | W | 2L | (n+1)L | |||||
文献[ | √ | W | √ | W | 2L | 2L | |||||
文献[ | √ | S | √ | W | L | (n+1)L | |||||
文献[ | √ | S | √ | W | L | 2L | |||||
文献[ | √ | S | √ | W | L | L | |||||
文献[ | √ | S | √ | S | L | 2L | |||||
文献[ | √ | W | √ | W | L | (n+1)L | |||||
文献[ | √ | S | √ | W | L | (n+1)L | |||||
文献[ | √ | S | √ | W | L | (n+1)L | |||||
文献[ | √ | S | √ | W | L | (n+1)L | |||||
文献[ | √ | S | √ | W | L | 2L | |||||
文献[ | √ | S | √ | S | 3L | 2L | |||||
文献[ | √ | S | √ | W | L | (n+1)L | |||||
本文方案 | √ | S | √ | S | L | 2L |
表2
效率对比"
方案 | 单个签名 | 验证 | 聚合验证 |
文献[ | 2PM+1MTP+1PA | 3P+2MTP | (2n+1)P+2nMTP |
文献[ | 2MTP+3GM+2PA | 3PT+3MTP+1GM+1PA | (n+2)P+(2n+1)MTP+nGM+nPA |
文献[ | 3PM+2MTP+2PA | 4P+3MTP | (n+3)P+(2n+1)MTP |
文献[ | 5PM+3MTP+4PA+1H | 5P+4MTP+2PM+1PA+1H | 5P+(n+3)MTP+nH+2nPM+nPA |
文献[ | 3PM+3ZM+1PA+1H | 3P+2MTP+3PM+1PA+3H | 3P+2nMTP+3nPM+3nH+nPA |
文献[ | 5PM+3ZM+3PA+1H | 4P+2MTP+3PM+2PA+3H | 4P+2nMTP+3nPM+2nPA+3nH |
文献[ | 4ZM+2H | 3P+1MTP+1ZM+1H | (n+2)P+nMTP+nZM+nH |
文献[ | 3PM+2ZM+1H | 3P+1MTP+2PM+1H+1PA | 3P+nMTP+2nPM+nH+nPA |
文献[ | 3PM+2ZM+2H+2PA | 3P+1MTP+2PM+2H+1PA | 3P+nMTP+2nPM+2nH+nPA |
文献[ | 3PM+2MTP+2ZM+2H+2PA | 4P+3MTP+2PM+2H | 4P+(n+2)MTP+2nPM+2nH |
文献[ | 5E+1PM+2MTP+3GM+2H | 4P+4MTP+1GM+2E+2H | 4P+(2n+2)MTP+nGM+2nE+2nH |
文献[ | 3E+1MTP+1GM+1ZM+1H | 4P+2MTP+1E+1H | (n+3)P+2nMTP+nE+nH |
文献[ | 4PM+1MTP+2ZM+1H+4PA | 3P+2MTP+2PM+1H+2PA | 3P+(n+1)MTP+2nPM+nH+2nPA |
本文方案 | 1PM+1H+1PA | 3P+2MTP+2PM+1H+1PA | 3P+(n+1)MTP+2nPM+nH+nPA |
[1] | TZENG Z J , TZENG W G . Authentication of mobile users in third generation mobile systems[J]. Wireless Personal Communications, 2001,16(1):35-50. |
[2] | HWANG K F , CHANG C C . A self-encryption mechanism for au-thentication of roaming and teleconference services[J]. IEEE Transactions on Wireless Communications, 2003,2(2):400-407. |
[3] | JIANG Y , LIN C , SHEN X , et al. Mutual authentication and key exchange protocols for roaming services in wireless mobile net-works[J]. IEEE Transactions on Wireless Communications, 2006,5(9):2569-2577. |
[4] | ARKKO J , HAVERINEN H . Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA)[J]. Heise Zeitchriften Veriag, 2006,47(2):64-77. |
[5] | CHANG C C , LEE C Y , CHIU Y C . Enhanced authentication scheme with anonymity for roaming service in global mobility networks[J]. Computer Communications, 2009,32(4):611-618. |
[6] | ZHOU T , XU J . Provable secure authentication protocol with ano-nymity for roaming service in global mobility networks[J]. Computer Networks, 2011,55(1):205-213. |
[7] | GO J , PARK J , KIM K . Wireless authentication protocol preserving user anonymity[J]. Authentication, 2001,3(2):78-81. |
[8] | HE D , MA M , ZHANG Y , et al. A strong user authentication scheme with smart cards for wireless communications[J]. Computer Communications, 2011,34(3):367-374. |
[9] | REN K , LOU W , KIM K , et al. A novel privacy preserving authenti-cation and access control scheme for pervasive computing environments[J]. IEEE Transactions on Vehicular Technology, 2006,55(4):1373-1384. |
[10] | TREVATHAN J , GHODOSI H , READ W . An anonymous and secure continuous double auction scheme[C]// The 39th Annual Hawaii International Conference on System Sciences.IEEE, c2006:125. |
[11] | KIM J , CHOI S , KIM K , et al. Anonymous authentication protocol for dynamic groups with power-limited devices[C]// Symposium on Cryptography and Information Security (SCIS'03). c2013:405-410. |
[12] | YANG G , WONG D S , DENG X . Anonymous and authenticated key exchange for roaming networks[J]. IEEE Transactions on Wireless Communications, 2007,6(9):3461-3472. |
[13] | YANG G , WONG D S , DENG X . Formal security definition and efficient construction for roaming with a privacy-preserving extension[J]. JUCS, 2008,14(3):441-462. |
[14] | 彭华熹 . 一种基于身份的多信任域认证模型[J]. 计算机学报, 2006,29(8):1271-1281. PENG H X . An identity-based authentication model for multi-domain[J]. Chinese Journal of Computers, 2006,29(8):1271-1281. |
[15] | WAN Z , REN K , PRENEEL B . A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks[C]// The first ACM Conference on Wireless Network Security.ACM, c2008:62-67. |
[16] | FATEMI M , SALIMI S , SALAHI A . Anonymous roaming in univer-sal mobile telecommunication system mobile networks[J]. IET Information Security, 2010,4(2):93-103. |
[17] | YANG G , HUANG Q , WONG D S , et al. Universal authentication protocols for anonymous wireless communications[J]. IEEE Transactions on Wireless Communications, 2010,9(1):168-174. |
[18] | 田子建, 王继林, 伍云霞 . 一个动态的可追踪匿名认证方案[J]. 电子与信息学报, 2005,27(11):1737-1740. CAO C L , LIU M Q , ZHANG R . Provably secure authenticated key agreement protocol based on hierarchical identity[J]. Journal of Electronics & Information Technology, 2005,27(11):1737-1740. |
[19] | HOU H , LIU S . CPK-based authentication and key agreement protocols with anonymity for wireless network[C]// 2009 International Con-ference on Multimedia Information Networking and Security.IEEE, c2009:347-350. |
[20] | ZHANG M , PEI C , DANG L . An efficient certificateless registration protocol for mobile IP networks[J]. Journal of Convergence Information Technology, 2012,7(23):34-41. |
[21] | HE D , BU J , CHAN S , et al. Privacy-preserving universal authentica-tion protocol for wireless communications[J]. IEEE Transactions on Wireless Communications, 2011,10(2):431-436. |
[22] | HE D , CHEN C , CHAN S , et al. Secure and efficient handover au-thentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 2012,11(1):48-53. |
[23] | HE D , CHEN C , CHAN S , et al. Analysis and improvement of a se-cure and efficient handover authentication for wireless networks[J]. Communications Letters, IEEE, 2012,16(8):1270-1273. |
[24] | TSAI J L , LO N W , WU T C . Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 2013,73(3):1037-1047. |
[25] | KIM J S , KWAK J . Improved secure anonymous authentication scheme for roaming service in global mobility networks[J]. International Journal of Security and Its Applications, 2012,6(3):45-54. |
[26] | KUO W C , WEI H J , CHENG J C . Enhanced secure authentication scheme with anonymity for roaming in mobility networks[J]. Information Technology and Control, 2014,43(2):151-156. |
[27] | ZHANG Y , WANG C . Comment on new construction of efficient certificateless aggregate signatures[J]. International Journal of Security and Its Applications, 2015,9(1):147-154. |
[28] | CHENG L , WEN Q , JIN Z , et al. Cryptanalysis and improvement of a certificateless aggregate signature scheme[J]. Information Sciences, 2015,295:337-346. |
[29] | CHEN Y C , TSO R , HORNG G , et al. Strongly secure certificateless signature: cryptanalysis and improvement of two schemes[J]. Journal of Information Science and Engineering, 2015,31(1):297-314. |
[30] | HUANG X , MU Y , SUSILO W , et al. Certificateless signature revisited[C]// Information Security and Privacy.Springer Berlin Heidelberg, c2007:308-322. |
[31] | GONG Z , LONG Y , HONG X , et al. Two certificateless aggregate signatures from bilinear maps[C]// Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, c2007:188-193. |
[32] | ZHANG L , ZHANG F . A new certificateless aggregate signature scheme[J]. Computer Communications, 2009,32(6):1079-1085. |
[33] | ZHANG L , QIN B , WU Q , et al. Efficient many-to-one authentication with certificateless aggregate signatures[J]. Computer Networks, 2010,54(14):2482-2491. |
[34] | XIONG H , WU Q , CHEN Z . Strong security enabled certificateless aggregate signatures applicable to mobile computation[C]// 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS).IEEE, c2011:92-99. |
[35] | XIONG H , WU Q , CHEN Z . An efficient provably secure certificate-less aggregate signature applicable to mobile computation[J]. Control and Cybernetics, 2012,41(2):373-391. |
[36] | CHEN Y C , HORNG G , LIU C L , et al. Efficient certificateless ag-gregate signature scheme[J]. Journal Electronic Science and Technology, 2012,10:209-214. |
[37] | XIONG H , GUAN Z , CHEN Z , et al. An efficient certificateless ag-gregate signature with constant pairing computations[J]. Information Sciences, 2013,219(10):225-235. |
[38] | LIU H , WANG S , LIANG M , et al. New construction of efficient certificateless aggregate signatures[J]. International Journal of Security and Its Applications, 2014,8:411-422. |
[39] | TU H , HE D , HUANG B . Reattack of a certificateless aggregate sig-nature scheme with constant pairing computations[J]. The Scientific World Journal, 2014,2014(9-10):343715. |
[40] | 刘贺 . 移动网络接入认证的隐私保护研究[D]. 北京:北京交通大学, 2014. LIU H . Research on privacy protection in access authentication for mobile networks[D]. Beijing: Beijing Jiaotong University, 2014. |
[1] | 马鑫迪, 李清华, 姜奇, 马卓, 高胜, 田有亮, 马建峰. 面向Non-IID数据的拜占庭鲁棒联邦学习[J]. 通信学报, 2023, 44(6): 138-153. |
[2] | 田有亮, 吴柿红, 李沓, 王林冬, 周骅. 基于激励机制的联邦学习优化算法[J]. 通信学报, 2023, 44(5): 169-180. |
[3] | 冯涛, 陈李秋, 方君丽, 石建明. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233. |
[4] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[5] | 胡柏吉, 张晓娟, 李元诚, 赖荣鑫. 支持多功能的V2G网络隐私保护数据聚合方案[J]. 通信学报, 2023, 44(4): 187-200. |
[6] | 徐明, 张保俊, 伍益明, 应晨铎, 郑宁. 面向网络攻击和隐私保护的多智能体系统分布式共识算法[J]. 通信学报, 2023, 44(3): 117-127. |
[7] | 余晟兴, 陈钟. 基于同态加密的高效安全联邦学习聚合框架[J]. 通信学报, 2023, 44(1): 14-28. |
[8] | 张学旺, 黎志鸿, 林金朝. 基于公平盲签名和分级加密的联盟链隐私保护方案[J]. 通信学报, 2022, 43(8): 131-141. |
[9] | 王子园, 杜瑞忠. 边缘环境下基于无证书公钥密码的数据完整性审计方案[J]. 通信学报, 2022, 43(7): 62-72. |
[10] | 王竹, 杨思琦, 李凤华, 耿魁, 彭婷婷, 史梦瑶. 高效可证明安全的无证书有序聚合签名方案[J]. 通信学报, 2022, 43(5): 58-67. |
[11] | 王继锋, 王国峰. 边缘计算模式下密文搜索与共享技术研究[J]. 通信学报, 2022, 43(4): 227-238. |
[12] | 封化民, 史瑞, 袁峰, 李艳俊, 杨旸. 高效的强隐私保护和可转让的属性票据方案[J]. 通信学报, 2022, 43(3): 63-75. |
[13] | 张琳, 魏新艳, 刘茜萍, 黄海平, 王汝传. 基于协作信誉和设备反馈的物联网边缘服务器信任评估算法[J]. 通信学报, 2022, 43(2): 118-130. |
[14] | 于海宁, 张宏莉, 余翔湛, 曲家兴, 葛蒙蒙. 隐私保护的轨迹相似度计算方法[J]. 通信学报, 2022, 43(11): 1-13. |
[15] | 彭滔, 钟文韬, 王国军, 罗恩韬, 熊金波, 刘忆宁, Hao Wang. 移动社交网络中面向隐私保护的精确好友匹配[J]. 通信学报, 2022, 43(11): 90-103. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|