Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Lattice-based Anonymous Roaming Authentication Method

An authentication method and stage technology, applied in the field of information security technology and mobile Internet, to achieve the effects of low communication overhead, high computing speed, and good performance

Active Publication Date: 2022-05-03
CHONGQING UNIV OF POSTS & TELECOMM
View PDF27 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the openness and dynamics of ubiquitous networks, it becomes very challenging to design a secure and effective roaming authentication protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Lattice-based Anonymous Roaming Authentication Method
  • A Lattice-based Anonymous Roaming Authentication Method
  • A Lattice-based Anonymous Roaming Authentication Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0052] The technical scheme that the present invention solves the problems of the technologies described above is:

[0053] It should be pointed out that lattice in the present invention is an abbreviation of lattice cipher and is a proper noun.

[0054] Attached below figure 1 Describe the framework of the system.

[0055] (1) Mobile terminal (MU): In the registration phase, the user terminal registers with the local agent, and only when the identity of the mobile terminal is authenticated by the local agent can the registration succeed. When the mobile terminal enters the service scope of the foreign agent, it needs to conduct mutual authentication with the foreign agent with the help of the local age...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention requests protection of a grid-based anonymous roaming authentication method, and the invention includes a registration phase, an authentication phase, a password changing phase and a session key updating phase. After the smart terminal successfully registers with the local agent, the smart terminal generates a secure anonymous identity during the authentication phase, and uses the NTRU encryption algorithm to encrypt and transmit the authentication message between communication entities. After the authentication is successful, the smart terminal will use the anonymous identity to The foreign agent obtains network services. In the phase of password change, you only need to enter the correct user name and password into the smart card to complete the password change. In the session key update phase, the session key update operation can only be performed on the basis of the intelligent terminal and the foreign agent having the old session key. While resisting quantum attacks, the invention ensures extremely high computing efficiency and extremely low communication overhead, and has strong practicability and expansibility.

Description

technical field [0001] The invention belongs to the field of information security technology and mobile Internet technology, and relates to a roaming authentication method for providing safe and anonymous network services for mobile nodes. Background technique [0002] With the advancement of wireless Internet access technology and the popularity of smart mobile devices, ubiquitous networks have been widely used in our daily lives, providing people with a more convenient life. The ubiquitous network enables people to access network services such as online shopping, mobile payment, etc. However, due to its inherent openness and computing limitations, mobile devices are vulnerable to various security and privacy challenges in the ubiquitous network environment. For example, attackers can intercept transmitted data, and then analyze or tamper with the data, which will cause user data pollution and privacy leakage. [0003] Authentication is an important security technique to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/0431H04W12/06
CPCH04W12/06H04W12/02H04W12/068
Inventor 周由胜王龙安
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products