查詢結果分析
來源資料
頁籤選單縮合
題 名 | The Study of Practical Privacy Preserving and Forward Secure Authentication Technologies on Wireless Communications=可實現隱私保護及前推私密之無線通訊認證技術研究 |
---|---|
作 者 | 徐瑞壕; | 書刊名 | 中華民國資訊學會通訊 |
卷 期 | 16:3 2013.09[民102.09] |
頁 次 | 頁1-33 |
分類號 | 312.76 |
關鍵詞 | 無線通訊; 網路安全; 隱私保護; |
語 文 | 英文(English) |
英文摘要 | Information exchange in wireless communication without being blocked by terrain or infrastructure is easier and simpler than that in the traditional wired communication environments. Due to the transmission type, anyone can intercept information of wireless communication, so the anonymity and confidentiality are urgently required in wireless communications for concealing the footprint and communication of mobile users. Additionally, mobile devices may suffer from the risks of thievery and loss, which incur the exposure of the past encrypted transmitted data. Besides that, more advanced security requirements of truly non-repudiation and strong anonymity are urgently required. By non-repudiation mobile users can prevent from the dispute of charging services. By strong anonymity mobile users can keep the track of location private to the system of network service provider. In this thesis, for diverse security requirements of stronger session key confidentiality, user privacy, and non-repudiation in wireless communications we propose the following solutions. (1) We propose two efficient solutions by using secret chain (SC) based mechanism with symmetry-based cryptosystems for the security features of forward secrecy and anonymity in the standards of mobile networks, such as GSM, UMTS, and LTE, without losing the compatibility. We also present the synchronization mechanism for the SC-protocol. (2) This work shows the definition and implementation of truly non-repudiation certificateless short signature scheme, which eliminate the overhead of using public-key infrastructure (PKI) in wireless communications. (3) We present a group signature scheme with constant revocation costs on signers and verifiers. This scheme is much suitable for the applications of UMTS and VANETs where the amount of mobile users is million or more. (4) The thesis introduces the strong anonymous authentication protocols for UMTS networks using the proposed certificateless signature scheme, identity-based encryption, and verifier-local revocable group signatures with chronological anonymous credential issuing strategy. (5) This work realizes the strong anonymous authentication protocols for VANETs by applying the proposed group signature scheme. |
本系統中英文摘要資訊取自各篇刊載內容。