ID-based wireless authentication scheme with anonymity
Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in d...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74652813/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537638825197568 |
---|---|
author | ZHU Hui LI Hui SHU Wan-li WANG Yu-min |
author_facet | ZHU Hui LI Hui SHU Wan-li WANG Yu-min |
author_sort | ZHU Hui |
collection | DOAJ |
description | Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in detail.Especially,the anonymous security was analyzed by formal approach under the unauthenticated-links adversarial model.It is showed that the proposed scheme not only could achieve authentication securely but also has a secure anonymity,and could achieve the secure requirements of the wireless network.Moreover,the scheme is simple and efficient,and could be ap-plied to the authentication in the wireless network. |
format | Article |
id | doaj-art-a5ebde844ad64cf88de9c2fda1891154 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-a5ebde844ad64cf88de9c2fda18911542025-01-14T08:29:43ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013013013674652813ID-based wireless authentication scheme with anonymityZHU HuiLI HuiSHU Wan-liWANG Yu-minConsidered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in detail.Especially,the anonymous security was analyzed by formal approach under the unauthenticated-links adversarial model.It is showed that the proposed scheme not only could achieve authentication securely but also has a secure anonymity,and could achieve the secure requirements of the wireless network.Moreover,the scheme is simple and efficient,and could be ap-plied to the authentication in the wireless network.http://www.joconline.com.cn/zh/article/74652813/cryptographyunauthenticated-links adversarial modelanonymitywireless network |
spellingShingle | ZHU Hui LI Hui SHU Wan-li WANG Yu-min ID-based wireless authentication scheme with anonymity Tongxin xuebao cryptography unauthenticated-links adversarial model anonymity wireless network |
title | ID-based wireless authentication scheme with anonymity |
title_full | ID-based wireless authentication scheme with anonymity |
title_fullStr | ID-based wireless authentication scheme with anonymity |
title_full_unstemmed | ID-based wireless authentication scheme with anonymity |
title_short | ID-based wireless authentication scheme with anonymity |
title_sort | id based wireless authentication scheme with anonymity |
topic | cryptography unauthenticated-links adversarial model anonymity wireless network |
url | http://www.joconline.com.cn/zh/article/74652813/ |
work_keys_str_mv | AT zhuhui idbasedwirelessauthenticationschemewithanonymity AT lihui idbasedwirelessauthenticationschemewithanonymity AT shuwanli idbasedwirelessauthenticationschemewithanonymity AT wangyumin idbasedwirelessauthenticationschemewithanonymity |