当前位置: X-MOL 学术arXiv.cs.SI › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Novel Variable K-Pseudonym Scheme Applied to 5G Anonymous Access Authentication
arXiv - CS - Social and Information Networks Pub Date : 2021-06-14 , DOI: arxiv-2106.07158
Dong Ma, Xixiang Lyu, Renpeng Zou

Anonymous access authentication schemes provide users with massive application services while protecting the privacy of users' identities. The identity protection schemes in 3G and 4G are not suitable for 5G anonymous access authentication due to complex computation and pseudonym asynchrony. In this paper, we consider mobile devices with limited resources in the 5G network and propose an anonymous access authentication scheme without the Public Key Infrastructure. The anonymous access authentication scheme provides users with variable shard pseudonyms to protect users' identities asynchronously. With the variable shared pseudonym, our scheme can ensure user anonymity and resist the mark attack, a novel attack aimed at the basic k-pseudonym scheme. Finally, we analyze the scheme with BAN logic analysis and verify the user anonymity.

中文翻译:

一种应用于5G匿名接入认证的新型可变K-假名方案

匿名访问认证方案在保护用户身份隐私的同时,为用户提供海量应用服务。3G和4G中的身份保护方案由于计算复杂和假名异步,不适用于5G匿名接入认证。在本文中,我们考虑了 5G 网络中资源有限的移动设备,并提出了一种没有公钥基础设施的匿名访问认证方案。匿名访问认证方案为用户提供可变分片假名以异步保护用户身份。通过可变共享假名,我们的方案可以确保用户匿名并抵抗标记攻击,这是一种针对基本k-假名方案的新颖攻击。最后,我们通过 BAN 逻辑分析来分析该方案并验证用户匿名性。
更新日期:2021-06-15
down
wechat
bug