中国邮电高校学报(英文) ›› 2008, Vol. 15 ›› Issue (4): 69-74.doi:

• Artificial Intelligence • 上一篇    下一篇

Anonymous authentication protocol for multi-services in wireless environments

姜楠,王健   

  1. College of Computer Science, Beijing University of Technology, Beijing 100124, China
  • 收稿日期:2008-04-18 修回日期:1900-01-01 出版日期:2008-12-30
  • 通讯作者: 姜楠

Anonymous authentication protocol for multi-services in wireless environments

JIANG Nan, WANG Jian   

  1. College of Computer Science, Beijing University of Technology, Beijing 100124, China
  • Received:2008-04-18 Revised:1900-01-01 Online:2008-12-30
  • Contact: JIANG Nan

摘要:

To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.

关键词:

authentication,;wireless;networks,;trusted;domain,;secret;splitting,;hash;chain

Abstract:

To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.

Key words:

authentication;wireless networks;trusted domain;secret splitting;hash chain