User anonymous identity authentication protocol based on k-pseudonym set in wireless network

A wireless network and identity authentication technology, applied in the field of user anonymous identity authentication protocol, can solve the problems of weak security and low performance, and achieve the effect of reducing resource consumption

Active Publication Date: 2015-01-14
XIDIAN UNIV
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In order to solve the problem of weak security and low performance when using shared keys to realize anonymous authentication, fully considering the limited storage and computing resources of the client, an anonymous authentication scheme based on k-pseudonym set is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User anonymous identity authentication protocol based on k-pseudonym set in wireless network
  • User anonymous identity authentication protocol based on k-pseudonym set in wireless network
  • User anonymous identity authentication protocol based on k-pseudonym set in wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution and provides detailed implementation modes and implementation steps, but is not limited to this embodiment.

[0053] First, a description of the assumptions on which this agreement is based:

[0054] 1. Dolev-Yao model

[0055] The Dolev-Yao attacker model is widely used in the research and analysis of security protocols. Dolev and Yao studied the behavior of active attackers. Active attack means that the attacker first eavesdrops on the communication line to obtain information and then tries to crack the obtained information. The following assumptions are made about the behavior of the attacker in the model:

[0056] (1) The attacker can eavesdrop and intercept any message passing through the network;

[0057] (2) The attacker can store intercepted or self-constructed messages;

[0058] (3) Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user anonymous identity authentication protocol based on a k-pseudonym set in a wireless network. In the protocol, a user sends the information includes the k-pseudonym set of the true identity label of the user and the information encrypted through the true user shared key to an authentication server, the authentication server completes user authentication within the range of the traversal and the calculation of k pieces of user information; the average number of users needing traversal is half the sum of k and 1, and two types of methods for constructing the k-pseudonym set are provided at the same time. According to the protocol, anonymous authentication is achieved on the basis of a shared key by introducing the k-pseudonym set, and the resource loss, generated during anonymous authentication, of the user and the authentication server is lowered.

Description

technical field [0001] The invention relates to a communication technology, in particular to a user anonymous identity authentication protocol based on a k-pseudonym set in a wireless network. Background technique [0002] While the Internet has brought convenience to people's lives, it has also caused many security risks, especially the adverse effects caused by the leakage of personal information are very extensive. Therefore, the protection of personal information has attracted more and more attention. In identity authentication in a wireless environment, more and more users prefer anonymous authentication in order to protect their private information, so as to prevent attackers from obtaining more personal information by obtaining the user's location. [0003] The current anonymous authentication schemes can be divided into two categories: one is based on non-shared keys; the other is based on shared keys. At present, a large number of anonymous authentication schemes ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06
CPCH04W12/04H04W12/06
Inventor 李兴华赵婧温明军马建峰魏福山姜奇姚青松
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products