Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check

被引:6
作者
Gupta, Mohit [1 ]
Chaudhari, Narendra S. [1 ]
机构
[1] VNIT Nagpur, Dept Comp Sci & Engn, Nagpur, Maharashtra, India
关键词
Anonymous; Untraceability; Authentication; Roaming; Revocation; Wireless network; Exculpability; SECURITY;
D O I
10.1007/s12652-018-1131-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure seamless roaming in a wireless network is desirable in today's highly dynamic world. Providing revocation and nontraceability in an efficient two-party roaming authentication protocol is a challenging task. Conventional two-party protocols utilize pseudo-identities or group signature with revocation tokens to support non-traceability and strong user anonymity. Among the group signature based authentication schemes, only Priauth scheme has non-traceability or backward/forward unlinkability and the mobile user does not have to do any computation after each revocation. Despite all the advantages, Priauth scheme does not support exculpability or in other words the home server knows the group signing key of the mobile user. In case of dispute, the mobile user can deny that it generated signature because the mobile user and the home server both know the signing key of the mobile user. Thus, the mobile user cannot be held accountable. Moreover, Priauth has high revocation cost due to pairing operation performed for each revoked token in the revocation list during revocation checking at the foreign server. In addition, the existing group signature based authentication schemes are not provably secure in the random oracle model. We propose a provably secure two-party authentication protocol using group signature scheme which overcomes the weaknesses of Priauth scheme by supporting exculpability, backward unlinkability and using exponential operation instead of costlier pairing operation during revocation checking.
引用
收藏
页码:4491 / 4501
页数:11
相关论文
共 15 条
[1]  
[Anonymous], 1996, HDB APPL CRYPTOGRAPH
[2]  
ANSI X, 1999, 62 PUBL KEY CRYPT FI
[3]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]  
Bringer J., 2011, IACR CRYPTOL EPRINT, P376
[5]  
Gupta M, 2018, AD HOC NETW
[6]   Strong roaming authentication technique for wireless and mobile networks [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (08) :1028-1037
[7]   Security and Efficiency in Roaming Services for Wireless Networks: Challenges, Approaches, and Prospects [J].
He, Daojing ;
Chen, Chun ;
Bu, Jiajun ;
Chan, Sammy ;
Zhang, Yan .
IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (02) :142-150
[8]   Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks [J].
He, Daojing ;
Bu, Jiajun ;
Chan, Sammy ;
Chen, Chun .
IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (03) :616-622
[9]   Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (01) :48-53
[10]   Privacy-Preserving Universal Authentication Protocol for Wireless Communications [J].
He, Daojing ;
Bu, Jiajun ;
Chan, Sammy ;
Chen, Chun ;
Yin, Mingjian .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (02) :431-436