Acta Metallurgica Sinica(English letters) ›› 2013, Vol. 20 ›› Issue (1): 58-65.doi: 10.1016/S1005-8885(13)60008-4

• Networks • Previous Articles     Next Articles

Anonymous authentication scheme of trusted mobile terminal undermobile Internet


  1. 1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China 2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China 3. China Information Technology Security Evaluation Center, Beijing 100085, China
  • Received:2012-05-14 Revised:2013-02-26 Online:2013-02-28 Published:2013-02-28
  • Contact: De-dong ZHANG
  • Supported by:

    This work was supported by the National Natural Science Foundation of China (60803157, 90812001, 61170271).


In order to solve the contradictions between user privacy protection and identity authentication, an anonymous authentication scheme under mobile Internet is proposed, which is based on the direct anonymous attestation of trusted computing and uses the encrypting transfer and signature validation for its implementation. Aiming at two access mode of trusted mobile terminal under mobile Internet, self access and cross-domain access, the authentication process of each mode is described in details. The analysis shows that the scheme implements anonymous authentication on mobile Internet and is correct, controllable and unforgeable.

Key words:

trusted platform module, anonymous authentication, strong RSA assumption, remote attestation

CLC Number: