An Anonymous Roaming Authentication protocol with minimal exchanged message

碩士 === 國立雲林科技大學 === 電子與資訊工程研究所 === 94 === We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the user can prove his...

Full description

Bibliographic Details
Main Authors: Chi-Hsiang Hung, 洪吉祥
Other Authors: Lih-Chyau Wuu
Format: Others
Language:zh-TW
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/15942391570703243715
id ndltd-TW-094YUNT5393011
record_format oai_dc
spelling ndltd-TW-094YUNT53930112015-12-16T04:42:38Z http://ndltd.ncl.edu.tw/handle/15942391570703243715 An Anonymous Roaming Authentication protocol with minimal exchanged message 具有最小訊息交換量之匿名漫遊身份驗證機制 Chi-Hsiang Hung 洪吉祥 碩士 國立雲林科技大學 電子與資訊工程研究所 94 We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the user can prove his/her roaming legality without letting the server know his/her real identity. We employ the ID-based signature technique and secret sharing technique to provide the user anonymity and non-repudiation of roaming service during the mutual authentication process. The proposed scheme only requires two messages exchanged between the roaming user and the server, and a polynomial function is designed to revoke the roaming service of an illegal user. Lih-Chyau Wuu 伍麗樵 2006 學位論文 ; thesis 58 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立雲林科技大學 === 電子與資訊工程研究所 === 94 === We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the user can prove his/her roaming legality without letting the server know his/her real identity. We employ the ID-based signature technique and secret sharing technique to provide the user anonymity and non-repudiation of roaming service during the mutual authentication process. The proposed scheme only requires two messages exchanged between the roaming user and the server, and a polynomial function is designed to revoke the roaming service of an illegal user.
author2 Lih-Chyau Wuu
author_facet Lih-Chyau Wuu
Chi-Hsiang Hung
洪吉祥
author Chi-Hsiang Hung
洪吉祥
spellingShingle Chi-Hsiang Hung
洪吉祥
An Anonymous Roaming Authentication protocol with minimal exchanged message
author_sort Chi-Hsiang Hung
title An Anonymous Roaming Authentication protocol with minimal exchanged message
title_short An Anonymous Roaming Authentication protocol with minimal exchanged message
title_full An Anonymous Roaming Authentication protocol with minimal exchanged message
title_fullStr An Anonymous Roaming Authentication protocol with minimal exchanged message
title_full_unstemmed An Anonymous Roaming Authentication protocol with minimal exchanged message
title_sort anonymous roaming authentication protocol with minimal exchanged message
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/15942391570703243715
work_keys_str_mv AT chihsianghung ananonymousroamingauthenticationprotocolwithminimalexchangedmessage
AT hóngjíxiáng ananonymousroamingauthenticationprotocolwithminimalexchangedmessage
AT chihsianghung jùyǒuzuìxiǎoxùnxījiāohuànliàngzhīnìmíngmànyóushēnfènyànzhèngjīzhì
AT hóngjíxiáng jùyǒuzuìxiǎoxùnxījiāohuànliàngzhīnìmíngmànyóushēnfènyànzhèngjīzhì
AT chihsianghung anonymousroamingauthenticationprotocolwithminimalexchangedmessage
AT hóngjíxiáng anonymousroamingauthenticationprotocolwithminimalexchangedmessage
_version_ 1718152584591572992