ID-based wireless authentication scheme with anonymity

Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in d...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHU Hui, LI Hui, SHU Wan-li, WANG Yu-min
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74652813/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537638825197568
author ZHU Hui
LI Hui
SHU Wan-li
WANG Yu-min
author_facet ZHU Hui
LI Hui
SHU Wan-li
WANG Yu-min
author_sort ZHU Hui
collection DOAJ
description Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in detail.Especially,the anonymous security was analyzed by formal approach under the unauthenticated-links adversarial model.It is showed that the proposed scheme not only could achieve authentication securely but also has a secure anonymity,and could achieve the secure requirements of the wireless network.Moreover,the scheme is simple and efficient,and could be ap-plied to the authentication in the wireless network.
format Article
id doaj-art-a5ebde844ad64cf88de9c2fda1891154
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-a5ebde844ad64cf88de9c2fda18911542025-01-14T08:29:43ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013013013674652813ID-based wireless authentication scheme with anonymityZHU HuiLI HuiSHU Wan-liWANG Yu-minConsidered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in detail.Especially,the anonymous security was analyzed by formal approach under the unauthenticated-links adversarial model.It is showed that the proposed scheme not only could achieve authentication securely but also has a secure anonymity,and could achieve the secure requirements of the wireless network.Moreover,the scheme is simple and efficient,and could be ap-plied to the authentication in the wireless network.http://www.joconline.com.cn/zh/article/74652813/cryptographyunauthenticated-links adversarial modelanonymitywireless network
spellingShingle ZHU Hui
LI Hui
SHU Wan-li
WANG Yu-min
ID-based wireless authentication scheme with anonymity
Tongxin xuebao
cryptography
unauthenticated-links adversarial model
anonymity
wireless network
title ID-based wireless authentication scheme with anonymity
title_full ID-based wireless authentication scheme with anonymity
title_fullStr ID-based wireless authentication scheme with anonymity
title_full_unstemmed ID-based wireless authentication scheme with anonymity
title_short ID-based wireless authentication scheme with anonymity
title_sort id based wireless authentication scheme with anonymity
topic cryptography
unauthenticated-links adversarial model
anonymity
wireless network
url http://www.joconline.com.cn/zh/article/74652813/
work_keys_str_mv AT zhuhui idbasedwirelessauthenticationschemewithanonymity
AT lihui idbasedwirelessauthenticationschemewithanonymity
AT shuwanli idbasedwirelessauthenticationschemewithanonymity
AT wangyumin idbasedwirelessauthenticationschemewithanonymity