会议专题

An anonymous authentication scheme for mobile communication

In order to enable mobile network to provide anonymity services, ensure the confidentiality of the users identity, whereabouts and other information, we raised an anonymous authentication scheme. The scheme solves the problem of users anonymity not only in roaming network, but also in adscription network. The scheme bases on binary tree theory and the knowledge proof, and combines divisible e-cash theory to implement. Theoretical analysis and experimental results demonstrate using the scheme can provide users for anonymity service not only in roaming network, but also in adscription network.

authentication anonymous mobile computing privacy protecting

LIU Jin-ye GU Li-ze LUO Shou-shan YANG Yi-xian

Information Security Center, State Key Laboratory of Networking and Switching Technology Beijing Uni Key Laboratory of network and information attack & defense technology of MOE Beijing University of P Information Security Center, State Key Laboratory of Networking and Switching Technology Beijing Uni

国际会议

2010 IEEE International Conference Conferenhce on Wireless Communications,Networking and Information Security(2010 IEEE 无线通信、网络技术与信息安全国际会议 WCNIS)

北京

英文

1-6

2010-06-25(万方平台首次上网日期,不代表论文的发表时间)