计算机应用 ›› 2016, Vol. 36 ›› Issue (8): 2231-2235.DOI: 10.11772/j.issn.1001-9081.2016.08.2231

• 网络空间安全 • 上一篇    下一篇

移动网络可信匿名认证协议

张鑫1, 杨晓元1,2, 朱率率1   

  1. 1. 武警工程大学 电子技术系, 西安 710086;
    2. 武警工程大学 信息安全研究所, 西安 710086
  • 收稿日期:2016-01-27 修回日期:2016-03-17 出版日期:2016-08-10 发布日期:2016-08-10
  • 通讯作者: 张鑫
  • 作者简介:张鑫(1991-),男,安徽合肥人,硕士研究生,主要研究方向:信息安全、可信计算、可信网络连接;杨晓元(1959-),男,湖南湘潭人,教授,硕士,主要研究方向:信息安全、密码学;朱率率(1985-),男,山东淄博人,讲师,硕士,主要研究方向:信息安全、可信计算、密码学。
  • 基金资助:
    国家自然科学基金资助项目(61402530);武警工程大学基础研究基金资助项目(WJY201520)。

Trusted and anonymous authentication protocol for mobile networks

ZHANG Xin1, YANG Xiaoyuan1,2, ZHU Shuaishuai1   

  1. 1. Department of Electronic Technology, Engineering University of Armed Police Force, Xi'an Shaanxi 710086, China;
    2. Institute of Information Security, Engineering University of Armed Police Force, Xi'an Shaanxi 710086, China
  • Received:2016-01-27 Revised:2016-03-17 Online:2016-08-10 Published:2016-08-10
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (61272492, 61572521), the Natural Science Foundation of Shaanxi Province (2014JM8300), the Basic Research Program of Engineering University of Chinese People's Armed Police (WJY201422, WJY201523).

摘要: 针对终端接入移动网络缺乏可信性验证问题,提出一种移动网络可信匿名认证协议,移动终端在接入网络时进行身份验证和平台完整性认证。在可信网络连接架构下,给出了可信漫游认证和可信切换认证的具体步骤,在认证时利用移动终端中预存的假名和对应公私钥对实现了用户匿名隐私的保护。安全性分析表明,协议满足双向认证、强用户匿名性、不可追踪性和有条件隐私保护。协议中首次漫游认证需要2轮交互,切换认证需1轮即可完成,消息交换轮数和终端计算代价优于同类可信认证协议。

关键词: 可信计算, 可信网络连接, 移动网络, 漫游认证, 可信认证

Abstract: The lackness of trusted verification of mobile terminal may affect the security of mobile network. A trusted anonymous authentication protocol for mobile networks was proposed, in which both user identity and platform integrity were authenticated when the mobile terminal accesses the networks. On the basis of trusted network connection architecture, the concrete steps of trusted roaming authentication and trusted handover authentication were described in detail. The authentication used pseudonyms and the corresponding public/private keys to achieve the protection of the user anonymous privacy. The security analysis indicates that the proposed protocol meets mutual authentication, strong user anonymity, untraceability and conditional privacy preservation; moreover, the implementation of the first roaming authentication requires two rounds of communications while the handover authentication protocol just needs one round. The analytic comparisons show that the proposed protocol is efficient in terminal computation and turns of message exchange.

Key words: trusted computing, trusted network connection, mobile network, roaming authentication, trusted authentication

中图分类号: