Font Size: a A A

Design And Security Analysis Of Anonymous Authentication Schemes In The Mobile Internet

Posted on:2017-12-02Degree:DoctorType:Dissertation
Country:ChinaCandidate:H ShenFull Text:PDF
GTID:1318330485466028Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Mobile Internet, a huge industry of human beings coming after the Internet, is now in its explosive development stage. Due to the openness and complexity of the mobile Internet, the security problem has become a hot research topic in the field of cryptography. When the user enjoys services in the mobile Internet, he/she does not want to expose his/her private information, including identity, location and so on. Then, how to design a security authentication scheme, which can both provide server authentication and protect users'privacy, becomes more and more important.This paper mainly focuses on the design and security analysis of anonymous au-thentication schemes in the mobile Internet. Aiming at the demand of three differ-ent application environments (Mobile pay-TV system, Vehicular Ad-hoc Networks and Multi-server Architectures), we propose three new anonymous authentication schemes. The main research contents are shown as follows:1. We analyze the shortcomings of Wang and Qin's authentication scheme, which is vulnerable to the impersonation attack and cannot provide user anonymity. To address the weaknesses in the existing scheme, we propose a new one-to-many au-thentication scheme for access control in mobile pay-TV systems and demonstrate that it is provably security under the random oracle model. Moreover, compared to other authentication schemes, our scheme has better performance.2. We design an efficient IBDS scheme and give the security proof under the random oracle model. By using this IBDS scheme, we construct a new IBCPPA scheme. Security analysis shows the proposed scheme could satisfy all security requirements of the VANETs. Besides, the proposed IBCPPA scheme has better performance than related schemes.3. After giving the definition of the multi-server architecture environment and secu-rity model, we propose a new biometrics-based authentication scheme. Security analysis and performance analysis show that the proposed scheme avoids security weaknesses in previous schemes while additional cost is small.In summary, according to the different application environments in the mobile Internet, we propose three authentication schemes, and give detailed security proofs. Moreover, these schemes own high performance and are suitable for practical applica-tion.
Keywords/Search Tags:the Mobile Internet, Scheme, Anonymous, Provably Security, Bilinear Pairing
PDF Full Text Request
Related items