An Anonymous Roaming Authentication protocol with minimal exchanged message
碩士 === 國立雲林科技大學 === 電子與資訊工程研究所 === 94 === We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the user can prove his...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/15942391570703243715 |
id |
ndltd-TW-094YUNT5393011 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094YUNT53930112015-12-16T04:42:38Z http://ndltd.ncl.edu.tw/handle/15942391570703243715 An Anonymous Roaming Authentication protocol with minimal exchanged message 具有最小訊息交換量之匿名漫遊身份驗證機制 Chi-Hsiang Hung 洪吉祥 碩士 國立雲林科技大學 電子與資訊工程研究所 94 We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the user can prove his/her roaming legality without letting the server know his/her real identity. We employ the ID-based signature technique and secret sharing technique to provide the user anonymity and non-repudiation of roaming service during the mutual authentication process. The proposed scheme only requires two messages exchanged between the roaming user and the server, and a polynomial function is designed to revoke the roaming service of an illegal user. Lih-Chyau Wuu 伍麗樵 2006 學位論文 ; thesis 58 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立雲林科技大學 === 電子與資訊工程研究所 === 94 === We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the user can prove his/her roaming legality without letting the server know his/her real identity. We employ the ID-based signature technique and secret sharing technique to provide the user anonymity and non-repudiation of roaming service during the mutual authentication process. The proposed scheme only requires two messages exchanged between the roaming user and the server, and a polynomial function is designed to revoke the roaming service of an illegal user.
|
author2 |
Lih-Chyau Wuu |
author_facet |
Lih-Chyau Wuu Chi-Hsiang Hung 洪吉祥 |
author |
Chi-Hsiang Hung 洪吉祥 |
spellingShingle |
Chi-Hsiang Hung 洪吉祥 An Anonymous Roaming Authentication protocol with minimal exchanged message |
author_sort |
Chi-Hsiang Hung |
title |
An Anonymous Roaming Authentication protocol with minimal exchanged message |
title_short |
An Anonymous Roaming Authentication protocol with minimal exchanged message |
title_full |
An Anonymous Roaming Authentication protocol with minimal exchanged message |
title_fullStr |
An Anonymous Roaming Authentication protocol with minimal exchanged message |
title_full_unstemmed |
An Anonymous Roaming Authentication protocol with minimal exchanged message |
title_sort |
anonymous roaming authentication protocol with minimal exchanged message |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/15942391570703243715 |
work_keys_str_mv |
AT chihsianghung ananonymousroamingauthenticationprotocolwithminimalexchangedmessage AT hóngjíxiáng ananonymousroamingauthenticationprotocolwithminimalexchangedmessage AT chihsianghung jùyǒuzuìxiǎoxùnxījiāohuànliàngzhīnìmíngmànyóushēnfènyànzhèngjīzhì AT hóngjíxiáng jùyǒuzuìxiǎoxùnxījiāohuànliàngzhīnìmíngmànyóushēnfènyànzhèngjīzhì AT chihsianghung anonymousroamingauthenticationprotocolwithminimalexchangedmessage AT hóngjíxiáng anonymousroamingauthenticationprotocolwithminimalexchangedmessage |
_version_ |
1718152584591572992 |