首页 | 官方网站   微博 | 高级检索  
     

基于公钥的可证明安全的异构无线网络认证方案
引用本文:侯惠芳,刘光强,季新生,张秋闻.基于公钥的可证明安全的异构无线网络认证方案[J].电子与信息学报,2009,31(10):2385-2391.
作者姓名:侯惠芳  刘光强  季新生  张秋闻
作者单位:1. 国家数字交换系统工程技术研究中心,郑州,450002;河南工业大学信息科学与工程学院,郑州,450001
2. 河南工业大学信息科学与工程学院,郑州,450001
3. 国家数字交换系统工程技术研究中心,郑州,450002
基金项目:国家863计划项目(2007AA01Z434)资助课题 
摘    要:该文针对3G-WLAN异构网络的接入安全,对异构网络的实体进行抽象,建立了一种通用的认证模型。在该模型的基础上,利用Canetti-Krawczyk (CK)模型设计了一种新的接入认证与密钥协商方案。该方案利用公钥基础设施分配公钥,简化接入端服务器和归属端服务器间的认证过程和认证信息;利用椭圆曲线密码机制,减少了移动终端的认证计算量;最后利用CK模型对提出的协议进行了形式化分析和证明。分析表明该方案是安全有效的。

关 键 词:异构无线网络  椭圆曲线  接入认证  公开密钥基础设施  CK模型
收稿时间:2008-11-3
修稿时间:2009-5-4

Provable Security Authentication Scheme Based on Public Key for Heterogeneous Wireless Network
Hou Hui-fang Liu Guang-qiang Ji Xin-sheng Zhang Qiu-wen.Provable Security Authentication Scheme Based on Public Key for Heterogeneous Wireless Network[J].Journal of Electronics & Information Technology,2009,31(10):2385-2391.
Authors:Hou Hui-fang Liu Guang-qiang Ji Xin-sheng Zhang Qiu-wen
Affiliation:National Digital Switching System Engineering & Technological R & D Center, Zhengzhou 450002, China;College of Information Science and Engineering, Henan University of Technology, Zhengzhou 450001, China
Abstract:Aiming at access security aspect of 3G-WLAN heterogeneous wireless network, this paper abstracts each entities of heterogeneous wireless network, thereby establishes a general authentication model. Then based on this general authentication model, a novel access authentication and key agreement scheme by using Canetti-Krawczyk (CK) model is devised. This scheme simplifies the authentication process and information between access network server and home network server by using Public Key Infrastructure (PKI) to distribute public key. It also decreases the authentication computational complexity of mobile terminal by Elliptic Curves Cryptography (ECC). Finally, formal analysis and proof with CK model for the proposed protocol are given. It is showed that the proposed scheme is secure and efficient.
Keywords:Heterogeneous wireless network  Elliptic curves  Access authentication  Public Key Infrastructure (PKI)  CK model
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号