J4 ›› 2011, Vol. 38 ›› Issue (1): 176-183.doi: 10.3969/j.issn.1001-2400.2011.01.029

• Original Articles • Previous Articles     Next Articles

Anonymous authentication scheme for mobile communication

LIU Jinye1;GU Lize1;LUO Shoushan1;YANG Yixian1;CUI Jun2;WU Xingyao3   

  1. (1. Info. Security Center, State Key Lab. of Networking and Switching Tech., Beijing Univ. of Posts and Telecommunications, Beijing  100876, China;
    2. National Cybernet Security Co., Ltd., Beijing  100088, China;
    3. China Mobile Group Design Inst. Co., Ltd., Beijing  100088, China)
  • Received:2009-11-22 Online:2011-02-20 Published:2011-04-08
  • Contact: LIU Jinye E-mail:liujinye18@sina.com

Abstract:

In order to enable the mobile network to provide anonymity services and ensure the confidentiality of the user's identity, whereabouts and other information, we put up an anonymous authentication scheme, which solves the problem of user's anonymity not only in roaming network, but also in adscription network. The scheme has not only a small amount of communication, but also does not need to change the key every time. The scheme is based on the knowledge proof, and uses the direct anonymous attestation protocol theory together with encrypting transfer and signature validation for its implementation. Theoretical analysis and experimental results demonstrate that users do not need to go to the home agent to authenticate the user's identity in the roaming network, and that there is no need to map out its true identity in the adscription network. It implements user's anonymity in the whole network effectively.

Key words: authentication, anonymous, mobile computing, privacy protecting