Font Size: a A A

The Anonymous Authentication Protocol Based On Elliptic Curve Cryptography On Mobile Network Platform

Posted on:2012-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:J HeFull Text:PDF
GTID:2178330335480428Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, the popularity rate of mobile communications equipment has become higher and higher, and the ability of calculating and communication has become stronger and stronger; thus, the service of mobile communications network has also become more and more perfect. To the future user, working, entertaining and consuming by mobile communications network are no longer a dream. Among all the mobile communications services, the mobile electronic business stands out easily. Due to the ubiquity and convenience of mobile communications platform, people's consuming potential could be highly motivated and thus promote the development of social economy.However, just like the electronic business based on the internet platform, the one based on the mobile communications platform also has certain or more safety risks. First of all, there are attacks from the malicious users who can acquire other users'important data and cause various damages by using the bugs in the design of the mobile communications network. Second, there are still lots of restrictions in the calculating ability and system resources of the mobile communications platform. Those restrictions lead to some conflicts between the safety actuation and the smooth communication.To build a good mobile electronic business environment, the quality control of the mobile communications service as well as the privacy and safety of the mobile user are very important. One effective measure to solve the problem is anonymous authentication. But when the user is completely anonymous, the system operator cannot attain the users'information and cannot charge which is a contradiction. Besides, the system operator cannot restrict the malicious activities of the anonymous user because he cannot identify the true information of the user.This paper is intended to offer an anonymous authentication protocol which suits the mobile communications platform, based on the Elliptic Curve Cryptography and can protect the privacy and safety of the mobile user. In this protocol, the mobile user is both anonymous to the other users and to the system operator; however, the operator still can charge the user as well as carry on certain reciprocal measures while there is malicious and fraud consumption. At last, this paper provide a e-ticketing system based on the protocol.
Keywords/Search Tags:Mobile e-commerce, Anonymous authentication, Electronic ticketing, Elliptic curve cryptosystem, Mobile network
PDF Full Text Request
Related items