首页 | 本学科首页   官方微博 | 高级检索  
     

椭圆曲线加密结合散列函数的移动网络匿名安全认证方案
引用本文:陈跃辉,黄淼.椭圆曲线加密结合散列函数的移动网络匿名安全认证方案[J].电信科学,2016,32(5):114-120.
作者姓名:陈跃辉  黄淼
作者单位:1. 内江职业技术学院,四川 内江641000;2. 平顶山学院软件学院,河南 平顶山 467000
摘    要:为了防止私人数据泄露并完善已有的移动网络匿名漫游认证方案,提出了一种利用椭圆曲线加密结合散列函数的移动网络匿名安全认证方案。该方案利用椭圆曲线加密,结合散列函数,以随机数代替公开密钥加密和时间戳。首先,使用外地代理(FA)的漫游服务之前,计算单向散列函数,移动用户(MU)使用本地代理(HA)注册。然后,建立认证和会话的密钥,采用椭圆曲线加密,若HA一直待在同一FA中,则MU可以用FA更新会话密钥。最后,MU通过公共信道,利用HA修改密码。性能和安全性分析表明,相比其他几种类似方案,提出的方案明显提高了效率和安全性。其中,虚拟计算时间只有2.000 85 s,显著降低了计算开销。

关 键 词:移动网络  匿名安全认证  椭圆曲线加密  散列函数  假冒攻击  

Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Yuehui CHEN,Miao HUANG.Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network[J].Telecommunications Science,2016,32(5):114-120.
Authors:Yuehui CHEN  Miao HUANG
Affiliation:1. Neijiang Vocational and Technical College,Neijiang 641000,China;2. School of Software,Pingdingshan University,Pingdingshan 467000,China
Abstract:In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was proposed.With elliptic curve cryptography and hash functions,random numbers were used to replace public key encryption and time stamp.Firstly,before using the roaming services of a foreign agent(FA),hash function was calculated.A host agent(HA)was used by mobile user to register.Then,authentication and session key were set up with elliptic curve encryption.If HA is always in FA,MU can update the session key with FA.Finally,through a common channel,MU could utilize HA to change their passwords.The analysis of the performance and safety shows that,compared with other similar programs,the proposed scheme has significantly improved efficiency and safety.And the virtual computing time is only 2.000 85 seconds,which sharply reduces the cost of computing.
Keywords:mobile network  anonymous security authentication  elliptic curve cryptography  hash function  impersonation attack
本文献已被 万方数据 等数据库收录!
点击此处可从《电信科学》浏览原始摘要信息
点击此处可从《电信科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号