Direct anonymous authentication scheme for wireless networks under trusted computing
Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network ag...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74646018/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537730616492032 |
---|---|
author | YANG Li1 MA Jian-feng 1 PEI Qing-qi2 MA Zhuo 1 |
author_facet | YANG Li1 MA Jian-feng 1 PEI Qing-qi2 MA Zhuo 1 |
author_sort | YANG Li1 |
collection | DOAJ |
description | Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together.By using of temporary identi-ties and one time secret keys,identity anonymity and domain separation property are achieved.The analysis shows that the scheme is secure,reliable,and with higher performance. |
format | Article |
id | doaj-art-70c676c079354cc994a3ac4a42e61725 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2010-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-70c676c079354cc994a3ac4a42e617252025-01-14T08:24:47ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-01319810474646018Direct anonymous authentication scheme for wireless networks under trusted computingYANG Li1MA Jian-feng 1PEI Qing-qi2MA Zhuo 1Based on direct anonymous attestation of trusted computing,a wireless anonymous authentication scheme was proposed,the platform of the mobile node was verified by the foreign network agent and the identity of the mobile node user was authenticated by the home network agent and the foreign network agent together.By using of temporary identi-ties and one time secret keys,identity anonymity and domain separation property are achieved.The analysis shows that the scheme is secure,reliable,and with higher performance.http://www.joconline.com.cn/zh/article/74646018/wireless networksauthenticationanonymitytrusted computingremote attestation |
spellingShingle | YANG Li1 MA Jian-feng 1 PEI Qing-qi2 MA Zhuo 1 Direct anonymous authentication scheme for wireless networks under trusted computing Tongxin xuebao wireless networks authentication anonymity trusted computing remote attestation |
title | Direct anonymous authentication scheme for wireless networks under trusted computing |
title_full | Direct anonymous authentication scheme for wireless networks under trusted computing |
title_fullStr | Direct anonymous authentication scheme for wireless networks under trusted computing |
title_full_unstemmed | Direct anonymous authentication scheme for wireless networks under trusted computing |
title_short | Direct anonymous authentication scheme for wireless networks under trusted computing |
title_sort | direct anonymous authentication scheme for wireless networks under trusted computing |
topic | wireless networks authentication anonymity trusted computing remote attestation |
url | http://www.joconline.com.cn/zh/article/74646018/ |
work_keys_str_mv | AT yangli1 directanonymousauthenticationschemeforwirelessnetworksundertrustedcomputing AT majianfeng1 directanonymousauthenticationschemeforwirelessnetworksundertrustedcomputing AT peiqingqi2 directanonymousauthenticationschemeforwirelessnetworksundertrustedcomputing AT mazhuo1 directanonymousauthenticationschemeforwirelessnetworksundertrustedcomputing |