Font Size: a A A

An Authentication Scheme With Self-Certified Public-Key In 3G Communication Based On Elliptic Curve Cryptosystem

Posted on:2008-06-30Degree:MasterType:Thesis
Country:ChinaCandidate:L HuangFull Text:PDF
GTID:2178360215995597Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of telecommunication networks technology, a lot of secret infor-mation is transferred in Internet and more and more people pay attention to the informationsecurity. Authentication technology is a critical aspect of the information security technologyand plays a great important role in security system. Furthermore, it is likely that public-keybased authentication protocols will be employed for their intrinsic advantages over symmetrickey protocols. However, there are many differences between wireless environment andconventional lineate environment, for example, the narrow network bandwidth, the greatertransmission delay time, the lower memory capacity and electronic power. As a result, manysecurity schemes in lineate environment are not suitable for wireless environment and it isessential to study in designing an authentication scheme that can be used in wirelessenvironment.Based on the elliptic curve discrete logarithm problem, we adopt approaches tocombining PKBP (Public-Key Broadcast Protocol) with SPAKA (Self-certified Public-keybased Authentication and Key Agreement Protocol), and then design a mutual authenticationand key agreement authentication system used in 3G communications. Its security is based onthe elliptic curve discrete logarithm problem. Compared with other public-key basedauthentication protocols, SPAKA associated with PKBP reduces communicational payloadsand ME (Mobile Equipment) can enforce mutual authentication with VLR (Visit LocationRegister) without delivering its public-key certificate to VLR. Besides, the conversationlaunched by ME can be monitored in a controllable and legitimate way at required occasions.Thus this scheme that improves the security and efficiency of authentication system is wellsuited for supporting globe mobility with low computational loads and securecommunication.
Keywords/Search Tags:3G security, identity authentication, self-certified public-key, protocol Analysis
PDF Full Text Request
Related items