This paper analyzed the existing anonymous authentication schemes which have the weakness of high calculation and communication cost and weak security. So we designed a secure and efficient anonymous authentication scheme to meet the need of the space network, which has the characteristic of resource limited, high exposure and intermittent connectivity. At first we proposed a signature algorithm based on certificateless public key cryptosystem and one-off public key, and then presented an anonymous authentication scheme according to the proposed signature algorithm, it needs two message interaction to complete the mutual authentication and key agreement. When the user has the illegal behavior, the service provider can reveal the illegal use...
One of the goals of the sixth generation mobile networks (6G) is to achieve a larger network coverag...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
In this paper, we analyzed Hsu-Chuang scheme and presented the vulnerability. We further secured the...
Currently, space information network (SIN) has become an increasingly important role in real life. A...
Satellite communication has played an important part in many different industries because of its adv...
Abstract In a multi-server authentication environment, a user only needs to register once at a centr...
Anonymous data exchange is in great demand in many situations, especially in remote control systems,...
In order to protect the user's privacy identity, authentication requires anonymous authentication. A...
Abstract: Since the multi-user broadcast authentication protocol in current WSN cannot provide stron...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
Abstract—In this paper, we describe an efficient authentication protocol for group communication in ...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
Recently, Hsu and Chuang proposed an efficient user identification scheme with key preserving user a...
Authentication protocols are an extremely important aspect of a secure network connection. In essenc...
With rapid advances in satellite technology, space information network (SIN) has been proposed to me...
One of the goals of the sixth generation mobile networks (6G) is to achieve a larger network coverag...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
In this paper, we analyzed Hsu-Chuang scheme and presented the vulnerability. We further secured the...
Currently, space information network (SIN) has become an increasingly important role in real life. A...
Satellite communication has played an important part in many different industries because of its adv...
Abstract In a multi-server authentication environment, a user only needs to register once at a centr...
Anonymous data exchange is in great demand in many situations, especially in remote control systems,...
In order to protect the user's privacy identity, authentication requires anonymous authentication. A...
Abstract: Since the multi-user broadcast authentication protocol in current WSN cannot provide stron...
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authen...
Abstract—In this paper, we describe an efficient authentication protocol for group communication in ...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
Recently, Hsu and Chuang proposed an efficient user identification scheme with key preserving user a...
Authentication protocols are an extremely important aspect of a secure network connection. In essenc...
With rapid advances in satellite technology, space information network (SIN) has been proposed to me...
One of the goals of the sixth generation mobile networks (6G) is to achieve a larger network coverag...
[[abstract]]The use of anonymous channel tickets was proposed for authentication in wireless environ...
In this paper, we analyzed Hsu-Chuang scheme and presented the vulnerability. We further secured the...