Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check

被引:0
作者
Mohit Gupta
Narendra S. Chaudhari
机构
[1] VNIT Nagpur,Department of Computer Science and Engineering
来源
Journal of Ambient Intelligence and Humanized Computing | 2019年 / 10卷
关键词
Anonymous; Untraceability; Authentication; Roaming; Revocation; Wireless network; Exculpability;
D O I
暂无
中图分类号
学科分类号
摘要
Secure seamless roaming in a wireless network is desirable in today’s highly dynamic world. Providing revocation and non-traceability in an efficient two-party roaming authentication protocol is a challenging task. Conventional two-party protocols utilize pseudo-identities or group signature with revocation tokens to support non-traceability and strong user anonymity. Among the group signature based authentication schemes, only Priauth scheme has non-traceability or backward/forward unlinkability and the mobile user does not have to do any computation after each revocation. Despite all the advantages, Priauth scheme does not support exculpability or in other words the home server knows the group signing key of the mobile user. In case of dispute, the mobile user can deny that it generated signature because the mobile user and the home server both know the signing key of the mobile user. Thus, the mobile user cannot be held accountable. Moreover, Priauth has high revocation cost due to pairing operation performed for each revoked token in the revocation list during revocation checking at the foreign server. In addition, the existing group signature based authentication schemes are not provably secure in the random oracle model. We propose a provably secure two-party authentication protocol using group signature scheme which overcomes the weaknesses of Priauth scheme by supporting exculpability, backward unlinkability and using exponential operation instead of costlier pairing operation during revocation checking.
引用
收藏
页码:4491 / 4501
页数:10
相关论文
共 42 条
  • [1] Bringer J(2011)Backward unlinkability for a VLR group signature scheme with efficient revocation check IACR Cryptol ePrint Arch 2011 376-436
  • [2] Patey A(2011)Privacy-preserving universal authentication protocol for wireless communications IEEE Trans Wirel Commun 10 431-53
  • [3] He D(2012)Secure and efficient handover authentication based on bilinear pairing functions IEEE Trans Wirel Commun 11 48-622
  • [4] Bu J(2013)Handauth: efficient handover authentication with conditional privacy for wireless networks IEEE Trans Comput 62 616-150
  • [5] Chan S(2013)Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects IEEE Commun Mag 51 142-1037
  • [6] Chen C(2013)Strong roaming authentication technique for wireless and mobile networks Int J Commun Syst 26 1028-1491
  • [7] Yin M(2013)An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks Wirel Person Commun 68 1477-1481
  • [8] He D(2014)Efficient privacy-preserving authentication in wireless mobile networks IEEE Trans Mob Comput 13 1469-189
  • [9] Chen C(2015)Time-bound anonymous authentication for roaming networks IEEE Trans Inf Forensics Secur 10 178-undefined
  • [10] Chan S(2004)Sequences of games: a tool for taming complexity in security proofs IACR Cryptol ePrint Arch 2004 332-undefined