Journal on Communications ›› 2016, Vol. 37 ›› Issue (7): 182-192.doi: 10.11959/j.issn.1000-436x.2016147
• Academic communication • Previous Articles Next Articles
Dan LIU,Run-hua SHI,Shun ZHANG,Hong ZHONG
Online:
2016-07-25
Published:
2016-07-28
Supported by:
Dan LIU,Run-hua SHI,Shun ZHANG,Hong ZHONG. Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network[J]. Journal on Communications, 2016, 37(7): 182-192.
"
方案 | 第1类 | 第2类 | 公钥长度 | 聚合签名长度 | |||||||
B1 | B2 | B3 | 安全性 | B1 | B2 | B3 | 安全性 | ||||
文献[ | √ | W | √ | W | 2L | (n+1)L | |||||
文献[ | √ | W | √ | W | 2L | 2L | |||||
文献[ | √ | S | √ | W | L | (n+1)L | |||||
文献[ | √ | S | √ | W | L | 2L | |||||
文献[ | √ | S | √ | W | L | L | |||||
文献[ | √ | S | √ | S | L | 2L | |||||
文献[ | √ | W | √ | W | L | (n+1)L | |||||
文献[ | √ | S | √ | W | L | (n+1)L | |||||
文献[ | √ | S | √ | W | L | (n+1)L | |||||
文献[ | √ | S | √ | W | L | (n+1)L | |||||
文献[ | √ | S | √ | W | L | 2L | |||||
文献[ | √ | S | √ | S | 3L | 2L | |||||
文献[ | √ | S | √ | W | L | (n+1)L | |||||
本文方案 | √ | S | √ | S | L | 2L |
"
方案 | 单个签名 | 验证 | 聚合验证 |
文献[ | 2PM+1MTP+1PA | 3P+2MTP | (2n+1)P+2nMTP |
文献[ | 2MTP+3GM+2PA | 3PT+3MTP+1GM+1PA | (n+2)P+(2n+1)MTP+nGM+nPA |
文献[ | 3PM+2MTP+2PA | 4P+3MTP | (n+3)P+(2n+1)MTP |
文献[ | 5PM+3MTP+4PA+1H | 5P+4MTP+2PM+1PA+1H | 5P+(n+3)MTP+nH+2nPM+nPA |
文献[ | 3PM+3ZM+1PA+1H | 3P+2MTP+3PM+1PA+3H | 3P+2nMTP+3nPM+3nH+nPA |
文献[ | 5PM+3ZM+3PA+1H | 4P+2MTP+3PM+2PA+3H | 4P+2nMTP+3nPM+2nPA+3nH |
文献[ | 4ZM+2H | 3P+1MTP+1ZM+1H | (n+2)P+nMTP+nZM+nH |
文献[ | 3PM+2ZM+1H | 3P+1MTP+2PM+1H+1PA | 3P+nMTP+2nPM+nH+nPA |
文献[ | 3PM+2ZM+2H+2PA | 3P+1MTP+2PM+2H+1PA | 3P+nMTP+2nPM+2nH+nPA |
文献[ | 3PM+2MTP+2ZM+2H+2PA | 4P+3MTP+2PM+2H | 4P+(n+2)MTP+2nPM+2nH |
文献[ | 5E+1PM+2MTP+3GM+2H | 4P+4MTP+1GM+2E+2H | 4P+(2n+2)MTP+nGM+2nE+2nH |
文献[ | 3E+1MTP+1GM+1ZM+1H | 4P+2MTP+1E+1H | (n+3)P+2nMTP+nE+nH |
文献[ | 4PM+1MTP+2ZM+1H+4PA | 3P+2MTP+2PM+1H+2PA | 3P+(n+1)MTP+2nPM+nH+2nPA |
本文方案 | 1PM+1H+1PA | 3P+2MTP+2PM+1H+1PA | 3P+(n+1)MTP+2nPM+nH+nPA |
[1] | TZENG Z J , TZENG W G . Authentication of mobile users in third generation mobile systems[J]. Wireless Personal Communications, 2001,16(1):35-50. |
[2] | HWANG K F , CHANG C C . A self-encryption mechanism for au-thentication of roaming and teleconference services[J]. IEEE Transactions on Wireless Communications, 2003,2(2):400-407. |
[3] | JIANG Y , LIN C , SHEN X , et al. Mutual authentication and key exchange protocols for roaming services in wireless mobile net-works[J]. IEEE Transactions on Wireless Communications, 2006,5(9):2569-2577. |
[4] | ARKKO J , HAVERINEN H . Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA)[J]. Heise Zeitchriften Veriag, 2006,47(2):64-77. |
[5] | CHANG C C , LEE C Y , CHIU Y C . Enhanced authentication scheme with anonymity for roaming service in global mobility networks[J]. Computer Communications, 2009,32(4):611-618. |
[6] | ZHOU T , XU J . Provable secure authentication protocol with ano-nymity for roaming service in global mobility networks[J]. Computer Networks, 2011,55(1):205-213. |
[7] | GO J , PARK J , KIM K . Wireless authentication protocol preserving user anonymity[J]. Authentication, 2001,3(2):78-81. |
[8] | HE D , MA M , ZHANG Y , et al. A strong user authentication scheme with smart cards for wireless communications[J]. Computer Communications, 2011,34(3):367-374. |
[9] | REN K , LOU W , KIM K , et al. A novel privacy preserving authenti-cation and access control scheme for pervasive computing environments[J]. IEEE Transactions on Vehicular Technology, 2006,55(4):1373-1384. |
[10] | TREVATHAN J , GHODOSI H , READ W . An anonymous and secure continuous double auction scheme[C]// The 39th Annual Hawaii International Conference on System Sciences.IEEE, c2006:125. |
[11] | KIM J , CHOI S , KIM K , et al. Anonymous authentication protocol for dynamic groups with power-limited devices[C]// Symposium on Cryptography and Information Security (SCIS'03). c2013:405-410. |
[12] | YANG G , WONG D S , DENG X . Anonymous and authenticated key exchange for roaming networks[J]. IEEE Transactions on Wireless Communications, 2007,6(9):3461-3472. |
[13] | YANG G , WONG D S , DENG X . Formal security definition and efficient construction for roaming with a privacy-preserving extension[J]. JUCS, 2008,14(3):441-462. |
[14] | 彭华熹 . 一种基于身份的多信任域认证模型[J]. 计算机学报, 2006,29(8):1271-1281. PENG H X . An identity-based authentication model for multi-domain[J]. Chinese Journal of Computers, 2006,29(8):1271-1281. |
[15] | WAN Z , REN K , PRENEEL B . A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks[C]// The first ACM Conference on Wireless Network Security.ACM, c2008:62-67. |
[16] | FATEMI M , SALIMI S , SALAHI A . Anonymous roaming in univer-sal mobile telecommunication system mobile networks[J]. IET Information Security, 2010,4(2):93-103. |
[17] | YANG G , HUANG Q , WONG D S , et al. Universal authentication protocols for anonymous wireless communications[J]. IEEE Transactions on Wireless Communications, 2010,9(1):168-174. |
[18] | 田子建, 王继林, 伍云霞 . 一个动态的可追踪匿名认证方案[J]. 电子与信息学报, 2005,27(11):1737-1740. CAO C L , LIU M Q , ZHANG R . Provably secure authenticated key agreement protocol based on hierarchical identity[J]. Journal of Electronics & Information Technology, 2005,27(11):1737-1740. |
[19] | HOU H , LIU S . CPK-based authentication and key agreement protocols with anonymity for wireless network[C]// 2009 International Con-ference on Multimedia Information Networking and Security.IEEE, c2009:347-350. |
[20] | ZHANG M , PEI C , DANG L . An efficient certificateless registration protocol for mobile IP networks[J]. Journal of Convergence Information Technology, 2012,7(23):34-41. |
[21] | HE D , BU J , CHAN S , et al. Privacy-preserving universal authentica-tion protocol for wireless communications[J]. IEEE Transactions on Wireless Communications, 2011,10(2):431-436. |
[22] | HE D , CHEN C , CHAN S , et al. Secure and efficient handover au-thentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 2012,11(1):48-53. |
[23] | HE D , CHEN C , CHAN S , et al. Analysis and improvement of a se-cure and efficient handover authentication for wireless networks[J]. Communications Letters, IEEE, 2012,16(8):1270-1273. |
[24] | TSAI J L , LO N W , WU T C . Secure handover authentication protocol based on bilinear pairings[J]. Wireless Personal Communications, 2013,73(3):1037-1047. |
[25] | KIM J S , KWAK J . Improved secure anonymous authentication scheme for roaming service in global mobility networks[J]. International Journal of Security and Its Applications, 2012,6(3):45-54. |
[26] | KUO W C , WEI H J , CHENG J C . Enhanced secure authentication scheme with anonymity for roaming in mobility networks[J]. Information Technology and Control, 2014,43(2):151-156. |
[27] | ZHANG Y , WANG C . Comment on new construction of efficient certificateless aggregate signatures[J]. International Journal of Security and Its Applications, 2015,9(1):147-154. |
[28] | CHENG L , WEN Q , JIN Z , et al. Cryptanalysis and improvement of a certificateless aggregate signature scheme[J]. Information Sciences, 2015,295:337-346. |
[29] | CHEN Y C , TSO R , HORNG G , et al. Strongly secure certificateless signature: cryptanalysis and improvement of two schemes[J]. Journal of Information Science and Engineering, 2015,31(1):297-314. |
[30] | HUANG X , MU Y , SUSILO W , et al. Certificateless signature revisited[C]// Information Security and Privacy.Springer Berlin Heidelberg, c2007:308-322. |
[31] | GONG Z , LONG Y , HONG X , et al. Two certificateless aggregate signatures from bilinear maps[C]// Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, c2007:188-193. |
[32] | ZHANG L , ZHANG F . A new certificateless aggregate signature scheme[J]. Computer Communications, 2009,32(6):1079-1085. |
[33] | ZHANG L , QIN B , WU Q , et al. Efficient many-to-one authentication with certificateless aggregate signatures[J]. Computer Networks, 2010,54(14):2482-2491. |
[34] | XIONG H , WU Q , CHEN Z . Strong security enabled certificateless aggregate signatures applicable to mobile computation[C]// 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS).IEEE, c2011:92-99. |
[35] | XIONG H , WU Q , CHEN Z . An efficient provably secure certificate-less aggregate signature applicable to mobile computation[J]. Control and Cybernetics, 2012,41(2):373-391. |
[36] | CHEN Y C , HORNG G , LIU C L , et al. Efficient certificateless ag-gregate signature scheme[J]. Journal Electronic Science and Technology, 2012,10:209-214. |
[37] | XIONG H , GUAN Z , CHEN Z , et al. An efficient certificateless ag-gregate signature with constant pairing computations[J]. Information Sciences, 2013,219(10):225-235. |
[38] | LIU H , WANG S , LIANG M , et al. New construction of efficient certificateless aggregate signatures[J]. International Journal of Security and Its Applications, 2014,8:411-422. |
[39] | TU H , HE D , HUANG B . Reattack of a certificateless aggregate sig-nature scheme with constant pairing computations[J]. The Scientific World Journal, 2014,2014(9-10):343715. |
[40] | 刘贺 . 移动网络接入认证的隐私保护研究[D]. 北京:北京交通大学, 2014. LIU H . Research on privacy protection in access authentication for mobile networks[D]. Beijing: Beijing Jiaotong University, 2014. |
[1] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[2] | Shengxing YU, Zhong CHEN. Efficient secure federated learning aggregation framework based on homomorphic encryption [J]. Journal on Communications, 2023, 44(1): 14-28. |
[3] | Ziyuan WANG, Ruizhong DU. Certificateless public key cryptography based provable data possession scheme in edge environment [J]. Journal on Communications, 2022, 43(7): 62-72. |
[4] | Zhu WANG, Siqi YANG, Fenghua LI, Kui GENG, Tingting PENG, Mengyao SHI. Efficient and provably-secure certificateless sequential aggregate signature scheme [J]. Journal on Communications, 2022, 43(5): 58-67. |
[5] | Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE. Privacy-preserving trajectory similarity computation method [J]. Journal on Communications, 2022, 43(11): 1-13. |
[6] | Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao. Privacy-preserving precise profile matching in mobile social network [J]. Journal on Communications, 2022, 43(11): 90-103. |
[7] | Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG. Privacy-preserving attribute ticket scheme based on mobile terminal with smart card [J]. Journal on Communications, 2022, 43(10): 26-41. |
[8] | Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN. Towards edge-collaborative, lightweight and privacy-preserving classification framework [J]. Journal on Communications, 2022, 43(1): 127-137. |
[9] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[10] | Qimei CUI, Wenjing ZHAO, Xiaoyang GU, Zengbao ZHU, Xiaoxuan ZHU, Xiaofeng TAO, Wei NI. Efficient handover authentication and secure key-updating mechanism for B5G networks [J]. Journal on Communications, 2021, 42(12): 96-108. |
[11] | Xiangmao CHANG, Jun ZHAN, Zhiwei WANG. Low-cost group-based identity security authentication protocol for NB-IoT nodes [J]. Journal on Communications, 2021, 42(12): 152-162. |
[12] | Jiaqi WANG,Ning LU,Qingfeng CHENG,Zhaoxia WU,Wenbo SHI. Privacy-preserving multi-attribute reverse spectrum auction scheme [J]. Journal on Communications, 2020, 41(9): 77-91. |
[13] | Yousheng ZHOU,Chang TAN,Fei TANG. Multi-dimensional secure query scheme for fog-enhanced IIoT [J]. Journal on Communications, 2020, 41(8): 175-186. |
[14] | Jiayin LI,Wenzhong GUO,Xiaoyan LI,Ximeng LIU. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic [J]. Journal on Communications, 2020, 41(7): 73-83. |
[15] | Ming LI,Xiaopeng YANG,Hui ZHU,Fengwei WANG,Qi LI. Efficient and privacy-preserving online face authentication scheme [J]. Journal on Communications, 2020, 41(5): 205-214. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|