期刊文献+

基于雾节点的移动终端无证书认证方案

Certificateless Authentication Scheme for Mobile Terminal Based on Fog Node
在线阅读 下载PDF
导出
摘要 目前采用的雾计算节点参与的重复认证带来的计算和通信压力对于以轻量级为目标的移动终端而言是难以承受的,繁琐的计算过程会导致网络拥塞,损耗认证中心不必要的计算开销。因此,提出了基于雾节点的移动终端无证书认证方案,解决了传统的公钥密码设施架构下证书存储、管理和传递过程中造成的较大资源消耗的问题。通过为移动终端用户生成假名身份进一步实现了雾计算认证过程中的身份隐私保护;通过构造不使用计算开销大的双线性对运算的签名,缩短签名长度,在支持移动性的同时提高认证效率,更满足雾节点切换过程中对实时性的高要求。最后,进行了安全性分析和性能仿真比较。 At present,the mobile terminal which regards the lightweight as the target couldn’t afford the computation and communication pressures brought by the repetitive authentications involving the fog computing nodes.Prolix computing process might lead to network congestion,and bring needless computation to the authentication center.Thus,a certificateless authentication scheme for mobile terminal based on fog nodes is proposed to solve the problem of high resource consumption caused by the certificate storage,management and delivery in the traditional public key cryptosystem architecture.In this scheme,pseudonyms are created for the users to further protect the privacy in the certification process of fog computing.By constructing a signature without using the bi-linear pairing,the length of the signature is shortened.The signature can both improve the authentication efficiency while keeping the movability and further satisfy the requirement of real-time in the switching process of fog nodes.Finally,security analysis and performance comparison are performed in this paper.
作者 曾萍 袁琳 高原 马英杰 ZENG Ping;YUAN Lin;GAO Yuan;MA Yingjie(Beijing Electronic Science and Technology Institute,Beijing 100070,P.R.China)
出处 《北京电子科技学院学报》 2019年第3期50-60,共11页 Journal of Beijing Electronic Science And Technology Institute
关键词 雾计算 漫游认证 无证书 移动终端 fog computing roaming authentication certificateless mobile terminal
作者简介 曾萍(1969—),女,教授,博士,研究方向为物联网安全;袁琳(1994—),女,硕士,研究方向为物联网安全;高原(1979—),女,讲师,博士,研究方向为网络安全;马英杰(1979—),女,副教授,博士,研究方向为混沌密码通信。
  • 相关文献

参考文献5

二级参考文献29

  • 1CAO Chunjie,MA Jianfeng,MOON Sangjae.Provable Efficient Certificateless Group Key Exchange Protocol[J].Wuhan University Journal of Natural Sciences,2007,12(1):41-45. 被引量:8
  • 2BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[ C]//Proceedings of Cryptology-Eurocrypt 2003. Berlin: Springer, 2003: 416-432.
  • 3AL-RIYAMI S, PATERSON K. Certificateless public key cryptography [ C ]//Advances in Cryptology -- Asiacrypt 2003. Berlin: Springer, 2003: 452-473.
  • 4GONG Zheng, LONG Yu, HONG Xuan, et al. Two certificateless aggregate signatures from bilinear maps [ C ]//Proceedings of IEEE SNPD 2007. Washington: IEEE Computer Society, 2007 : 188-193.
  • 5ZHANG Lei, ZHANG Futai, A new certificateless aggregate signature scheme [ J ]. Computer Communications, 2009, 32 (6) : 1079-1085.
  • 6ZHANG Lei, QIN Bo, WU Qianhong, et al. Efficient many-to-one authentication with certificateless aggregate signatures [ J]. Computer Networks, 2010, 54(14) :2482-2491.
  • 7XIONG Hu, GUAN Zhi, CHEN Zhong, et al. An efficient certificateless aggregate signature with constant pairing computa- tions [ J]. Information Science, 2013, 219:225-235.
  • 8HE Debiao, TIAN Miaomiao, CHEN Jianhua. A note on ' An efficient certificateless aggregate signature with constant pairing computations' [EB/OL]. [ 2012-02-03 ]. http://eprint, iacr. org/2012/445, pdf.
  • 9BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques.Berlin: Springer-Verlag, 2003:416-432.
  • 10AL-RIYAMI S, PATERSON K.Certificateless public key cryptography[C]//Proceedings of Asiacrypt 2003. Berlin: Springer-Verlag, 2003:452-473.

共引文献89

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部