Direct anonymous authentication scheme for wireless networks under trusted computing

Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network ag...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG Li1, MA Jian-feng 1, PEI Qing-qi2, MA Zhuo 1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74646018/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537730616492032
author YANG Li1
MA Jian-feng 1
PEI Qing-qi2
MA Zhuo 1
author_facet YANG Li1
MA Jian-feng 1
PEI Qing-qi2
MA Zhuo 1
author_sort YANG Li1
collection DOAJ
description Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together.By using of temporary identi-ties and one time secret keys,identity anonymity and domain separation property are achieved.The analysis shows that the scheme is secure,reliable,and with higher performance.
format Article
id doaj-art-70c676c079354cc994a3ac4a42e61725
institution Kabale University
issn 1000-436X
language zho
publishDate 2010-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-70c676c079354cc994a3ac4a42e617252025-01-14T08:24:47ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-01319810474646018Direct anonymous authentication scheme for wireless networks under trusted computingYANG Li1MA Jian-feng 1PEI Qing-qi2MA Zhuo 1Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together.By using of temporary identi-ties and one time secret keys,identity anonymity and domain separation property are achieved.The analysis shows that the scheme is secure,reliable,and with higher performance.http://www.joconline.com.cn/zh/article/74646018/wireless networksauthenticationanonymitytrusted computingremote attestation
spellingShingle YANG Li1
MA Jian-feng 1
PEI Qing-qi2
MA Zhuo 1
Direct anonymous authentication scheme for wireless networks under trusted computing
Tongxin xuebao
wireless networks
authentication
anonymity
trusted computing
remote attestation
title Direct anonymous authentication scheme for wireless networks under trusted computing
title_full Direct anonymous authentication scheme for wireless networks under trusted computing
title_fullStr Direct anonymous authentication scheme for wireless networks under trusted computing
title_full_unstemmed Direct anonymous authentication scheme for wireless networks under trusted computing
title_short Direct anonymous authentication scheme for wireless networks under trusted computing
title_sort direct anonymous authentication scheme for wireless networks under trusted computing
topic wireless networks
authentication
anonymity
trusted computing
remote attestation
url http://www.joconline.com.cn/zh/article/74646018/
work_keys_str_mv AT yangli1 directanonymousauthenticationschemeforwirelessnetworksundertrustedcomputing
AT majianfeng1 directanonymousauthenticationschemeforwirelessnetworksundertrustedcomputing
AT peiqingqi2 directanonymousauthenticationschemeforwirelessnetworksundertrustedcomputing
AT mazhuo1 directanonymousauthenticationschemeforwirelessnetworksundertrustedcomputing