1 / 15

Privacy-Preserving Universal Authentication Protocol for Wireless Communications

Privacy-Preserving Universal Authentication Protocol for Wireless Communications. Daojing He, Jiajun Bu, Sammy Chan, Chun Chen and Mingjian Yin IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS , VOL. 10, NO. 2, FEBRUARY 2011. Outline. Introduction Method : Priauth Scheme Conclusion.

tomai
Download Presentation

Privacy-Preserving Universal Authentication Protocol for Wireless Communications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy-Preserving Universal Authentication Protocol forWireless Communications DaojingHe, JiajunBu, Sammy Chan, Chun Chen and MingjianYin IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 2, FEBRUARY 2011

  2. Outline • Introduction • Method : Priauth • Scheme • Conclusion

  3. Introduction Seamless roaming over wireless networks is Highly desirable to mobile users, and security such as authentication of mobile users is challenging. In this paper, we propose a privacy- preserving universal authentication protocol, called “Priauth”.

  4. Introduction A typical roaming scenario involves three parties: Roaming user Visiting foreign server home server 𝐻 U V H

  5. Introduction A privacy-preserving user authentication scheme should satisfy the following requirements: 1.Server Authentication 2. Subscription Validation 3.Provision of user revocation mechanism

  6. Introduction 4. Key establishment 5. User anonymity 6. User untraceablility

  7. Outline • Introduction • Method : Priauth • Scheme • Conclusion

  8. Method : Priauth The method is the use of basic group signature. Group signature KEYGEN(N,T): a master public key 𝑚𝑝𝑘 secret keys𝑢𝑠𝑘[𝑖] The revocation token of member i at interval j is urt[i][ j]=Bij

  9. Method : Priauth REVOKE ( RLj , urt[i][ j] ):If i is revoked at time interval j , then RLj ← RLj ∪{ Bij }. SIGN ( mpk, j , usk[i],M) = σ VERIFY ( mpk, j , RLj ,σ , M)

  10. Method : Priauth Each server manages a group of subscribers, and each subscriber could be a roaming user. Each server also has a signing/verification key pair (𝑠𝑘, 𝑝𝑘) of a conventional digital signature method

  11. Method : Priauth

  12. Outline • Introduction • Method : Priauth • Scheme • Conclusion

  13. Scheme

  14. Outline • Introduction • Method : Priauth • Scheme • Conclusion

  15. Conclusion In this paper, we have proposed a novel protocol to achieve privacy-preserving universal authentication for wireless communications.

More Related