Font Size: a A A

Study On Anonymous Authentication For Mobile Communication

Posted on:2014-02-11Degree:DoctorType:Dissertation
Country:ChinaCandidate:J Y LiuFull Text:PDF
GTID:1228330401963152Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid growth in the number of users of mobile communications and various value-added services, at the same time user access to services, certification and verification requirements for their identity and personal information are more and more, followed by the leakage problem of personal information.Mobile networks need both to verify the user’s identity, and to maintain the confidentiality of the user’s identity information. Therefore, many users require mobile operators to provide an anonymous service that can not expose their personal information at the same time verify their identity. For example:national security, military, and government work staff. To the key technical issues that how to protect user privacy and does not affect the normal use based mobile communication network, this paper discusses the algorithms and implementations in a variety of contexts. Mainly related to the home network and the roaming network of anonymous authentication, and chargeback issues, anonymity revocation, unforgeability of e-fees, consumption link problem, can check duplicate payment, payment authentication mode and efficiency.The main research work and innovations are as follows:(1) Proposed a framework of the mobile communication system of anonymous authenticationThe paper made a total of six anonymous authentication schemes, all the framework of the programs are roughly the same, they are mainly composed of three parts by register management center, service provider and user, individual programs may also need to participate by a third-party certification body. The register management center is the part that mobile operators managed the user, the service provider is the part of the mobile operators to provide users with services, service providers can also be other cooperative suppliers. The certification system set the register management center initialization and user registration, the application of electronic fees, access services, and electronic fee clearing as the main link. In addition, each of the certification system program is to be evaluated mainly based on whether it’s anonymous in the home network, whether it’s anonymous in roaming network, chargeback style, whether the consumptions are no link, whether the duplicate payment can be investigated, whether the anonymity is revocable, the need to verify in home network and payment verification way, and other aspects.(2) Proposed the anonymous authentication scheme which can be achieved in home network and the scheme which can achieve anonymity authentication whithout home network to participate in roaming networkIn roaming network anonymous authentication scheme, due to the user’s anonymity is achieved using the alias, and the correspondence of the alias and the user’s true identity is mastered by the register management center of the home network, so the user’s anonymity can be revoked, and did not realize the real anonymity in home network. As the user most of the time uses in the home network, achieving anonymous of home network becomes very important. Most of the programs in this paper achieved the real anonymity in home network.In many previous programs, the operators need to verify the user’s identity in home network before providing services to users, so bring a decline in operating efficiency, so when the user roams to a foreign network, without getting relevant authentication information from the home network, and has become an important factor to improve the efficiency of the service. Most of the programs in this paper have been directly verifying the legality of users in roaming network, greatly improving the operating efficiency.(3) Achieved anonymous authentication scheme monthly deductions and online/offline payment verification methodMonthly service anonymous authentication scheme is based on knowledge proof, and it uses direct anonymous authentication protocol theory and combines encryption transmission and signature verification to achieve the anonymity of the entire network, and also provides users with a monthly subscription service at the same time, so it can reduce performance loss bringed by deductions and improve the operating efficiency of the system. But there are obvious shortcomings of monthly subscription service, the consumer’s bill can not be deducted at that time, resulting in narrowing of the scope of application, it can only be applied in specific services.Payment verification style will influenced on the efficiency of the agreement, this paper also conducted in-depth research, and offline validation achieved in some schemes. Offline validation simply to verify the legality of electronic fee, and can not be fully verified (eg, duplicate payment, etc.), only be fully validated in future settlement, so it will not have much risk in the micro-payment, but for the large consumption of users, the risk will be greatly increased. For the problem of large consumption, the paper proposed anonymous authentication scheme paid on or offline based on restrictive partially blind signature theory on the bilinear, the program can not only supports offline payment, but also supports online payments. Online/Offline payment anonymous authentication scheme can find the repeated consumption behavior of users, and there is no payment link, and it also provides good protection of consumer’s privacy.Finally, the research work is summarized, and the direction for further research is pointed out.
Keywords/Search Tags:anonymity, authentication, privacy protection, mobile computing, mobile payment
PDF Full Text Request
Related items