TY - JOUR
T1 - 一种高效的移动云服务环境下隐私保护认证协议
AU - Xiong, Ling
AU - Peng, Daiyuan
AU - Peng, Tu
AU - Liang, Hongbin
N1 - Publisher Copyright:
© 2019, Editorial Department of Journal of Southwest Jiaotong University. All right reserved.
PY - 2019/2/1
Y1 - 2019/2/1
N2 - To address the problems of mutual authentication and privacy preservation in mobile cloud computing (MCC) services, an efficient and provably secure privacy-preserving authentication protocol, based on an identity-based signature technique, is proposed for MCC services, achieving authentication without the help of a trusted third party. Additionally, because a multi-server authentication technique has been employed in the proposed scheme, mobile users can access all registered servers, which are registered only once at the registration centre. In the proposed scheme, time-consuming operations such as bilinear pairings and map-to-point hash are avoided in the resource-constrained mobile device. Thus, the running time of our scheme in the mobile device is 45.242 s, and the computational efficiency is approximately twice as fast as existing related schemes. Security analysis shows that our scheme can provide a variety of security features, such as user anonymity and untraceability.
AB - To address the problems of mutual authentication and privacy preservation in mobile cloud computing (MCC) services, an efficient and provably secure privacy-preserving authentication protocol, based on an identity-based signature technique, is proposed for MCC services, achieving authentication without the help of a trusted third party. Additionally, because a multi-server authentication technique has been employed in the proposed scheme, mobile users can access all registered servers, which are registered only once at the registration centre. In the proposed scheme, time-consuming operations such as bilinear pairings and map-to-point hash are avoided in the resource-constrained mobile device. Thus, the running time of our scheme in the mobile device is 45.242 s, and the computational efficiency is approximately twice as fast as existing related schemes. Security analysis shows that our scheme can provide a variety of security features, such as user anonymity and untraceability.
KW - Authentication
KW - Mobile cloud computing
KW - Privacy-preserving
UR - http://www.scopus.com/inward/record.url?scp=85063952618&partnerID=8YFLogxK
U2 - 10.3969/j.issn.0258-2724.20170596
DO - 10.3969/j.issn.0258-2724.20170596
M3 - 文章
AN - SCOPUS:85063952618
SN - 0258-2724
VL - 54
SP - 202
EP - 210
JO - Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University
JF - Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University
IS - 1
ER -