Font Size: a A A

Study On Authentication Protocol For Personal Communication Security

Posted on:2003-04-11Degree:DoctorType:Dissertation
Country:ChinaCandidate:J S TangFull Text:PDF
GTID:1118360065962197Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
Cryptographic primitives provide basic and economic solutions to mobile security architecture. It is important however, interesting task to study the authentication mechanism form the point views of security and efficiency. This paper focuses on following research works:1) The cryptanalysis of the 3G-authentication protocol exploits a principle that a public-key based authentication scheme should be adopted due to its services in the future.2) A public-key based Siemens-like protocol is revisited by focusing attentions on its efficiency, computation and communication complexity, with the help of Signcrytion paradigm.3) A remedy of this kind of protocol is developed in this dissertation by screwing weakness of original Zheng's signcryption protocols.4) A new identification scheme is proposed, which is provably secure in the random oracle model. There is only one exponent calculation in our scheme and the on-line computing is just a one multiplication together with one addition. Also an efficient signature scheme, secure against adaptive chosen message attack is derived including an efficient signcryption.5) A new approach to mobile mutual authentication is developed by means of the identification scheme mentioned above to minimize computation and communication complexity.6) New authentication architectures are proposed for future personal communication. The user module is separated from the mobile terminal so that it is suitable to authenticate several mobile terminals in multi-user setting concurrently. This architecture can be established by applying the mobile mutual authentication scheme described above, the Blue Tooth and biology identification technology.
Keywords/Search Tags:Network Security, Personal Communication, Authentication, Public-key Infrastructure, Identification, Digital Signature
PDF Full Text Request
Related items