改进的轻量级匿名认证协议方案
Improved Lightweight Anonymous Authentication Protocol
DOI: 10.12677/AAM.2020.95090, PDF,    科研立项经费支持
作者: 赵士琦, 刘胜男, 贾亦巧, 翟薛涵, 焦靓姝, 张 平:河南科技大学数学与统计学院,河南 洛阳
关键词: 智能手机匿名认证共享密钥轻量级Smartphone Anonymous Authentication Shared Key Lightweight
摘要: 本文基于Li协议的轻量级匿名认证协议,提出了一种改进的轻量级匿名认证协议方案。通过对服务器中存储的用户信息进行序号分配,认证阶段用户仅需发送经相应公私钥对共同加密后的位置序号以及加密后的用户真实信息到服务器进行认证,认证服务器反解出用户序号,计算该序列号所对应的用户信息并验证,完成认证过程。进一步的性能分析表明,所提方案不仅具有轻量级匿名认证协议的高安全性,也使得认证过程更加高效。
Abstract: Based on the lightweight anonymous authentication protocol based on Li protocol, an improved lightweight anonymous authentication protocol is proposed in this paper. By assigning serial numbers to user information stored in the serve, in the authentication stage, the user only needs to send the location serial number encrypted by the corresponding public and private keys and the encrypted user’s real information to the server for authentication. The authentication server works out the location serial number of the user and calculates the user’s information corresponding to this serial number and verifies it to complete the authentication process. Further performance analysis shows that the proposed scheme not only has the high security of lightweight anonymous authentication protocol, but also has more efficient authentication.
文章引用:赵士琦, 刘胜男, 贾亦巧, 翟薛涵, 焦靓姝, 张平. 改进的轻量级匿名认证协议方案[J]. 应用数学进展, 2020, 9(5): 759-764. https://doi.org/10.12677/AAM.2020.95090

参考文献

[1] Shao, J., Lin, X., Lu, R., et al. (2016) A Threshold Anonymous Authentication Protocol for VANETs. IEEE Transactions on Vehicular Technology, 65, 1711-1720. [Google Scholar] [CrossRef
[2] Chim, T.W., Yiu, S.M., Hui, L.C.K., et al. (2009) SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs. Ad Hoc Networks, 9,189-203. [Google Scholar] [CrossRef
[3] Wan, Z., Ren, K. and Preneel, B. (2008) A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile networks. ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, 31 March-April, DBLP, 62-67. [Google Scholar] [CrossRef
[4] Goldwasser, S., Micali, S. and Rackoff, C. (1989) The Knowledge Complexity of Interactive Proof-Systems. DBLP, 291-304.
[5] Gódor, G. and Imre, S. (2012) Hash-Based Mutual Authentication Protocol for Low-Cost RFID Systems. Proceedings of the Information and Communication Technologies, Budapest, 76-87. [Google Scholar] [CrossRef
[6] Li, X., Liu, H., Wei, F., et al. (2015) A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks. IEEE Global Communications Conference, IEEE, 1-6. [Google Scholar] [CrossRef
[7] Syamsuddin, I., Dillon, T., Chang, E., et al. (2008) A Survey of RFID Authentication Protocols Based on Hash-Chain Method. International Conference on Convergence and Hybrid Information Technology, IEEE, 559-564. [Google Scholar] [CrossRef
[8] 钟成, 李兴华, 宋园园, 马建峰. 无线网络中基于共享密钥的轻量级匿名认证协议[J]. 计算机学报, 2018, 41(5): 4-6.