File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TIFS.2014.2366300
- Scopus: eid_2-s2.0-84919819096
- WOS: WOS:000346751600008
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Time-bound anonymous authentication for roaming networks
Title | Time-bound anonymous authentication for roaming networks |
---|---|
Authors | |
Keywords | authentication applied cryptography anonymous roaming Accountable privacy revocation privacy |
Issue Date | 2015 |
Citation | IEEE Transactions on Information Forensics and Security, 2015, v. 10, n. 1, p. 178-189 How to Cite? |
Abstract | © 2014 IEEE. We propose an anonymous authentication protocol that supports time-bound credentials for an efficient revocation. It is especially suitable for large-scale network in roaming scenario. With our newly designed group signature scheme as a building block, a timestamp can be embedded to user secret key. No expired key can be used to authenticate, and hence naturally revoked users (e.g., due to contract expiration) are not required to be put into the revocation list. This makes our protocol much faster than previous roaming protocols in terms of revocation checking, which is a main part in verification. |
Persistent Identifier | http://hdl.handle.net/10722/280561 |
ISSN | 2023 Impact Factor: 6.3 2023 SCImago Journal Rankings: 2.890 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liu, Joseph K. | - |
dc.contributor.author | Chu, Cheng Kang | - |
dc.contributor.author | Chow, Sherman S.M. | - |
dc.contributor.author | Huang, Xinyi | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Zhou, Jianying | - |
dc.date.accessioned | 2020-02-17T14:34:21Z | - |
dc.date.available | 2020-02-17T14:34:21Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | IEEE Transactions on Information Forensics and Security, 2015, v. 10, n. 1, p. 178-189 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280561 | - |
dc.description.abstract | © 2014 IEEE. We propose an anonymous authentication protocol that supports time-bound credentials for an efficient revocation. It is especially suitable for large-scale network in roaming scenario. With our newly designed group signature scheme as a building block, a timestamp can be embedded to user secret key. No expired key can be used to authenticate, and hence naturally revoked users (e.g., due to contract expiration) are not required to be put into the revocation list. This makes our protocol much faster than previous roaming protocols in terms of revocation checking, which is a main part in verification. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Information Forensics and Security | - |
dc.subject | authentication | - |
dc.subject | applied cryptography | - |
dc.subject | anonymous roaming | - |
dc.subject | Accountable privacy | - |
dc.subject | revocation | - |
dc.subject | privacy | - |
dc.title | Time-bound anonymous authentication for roaming networks | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TIFS.2014.2366300 | - |
dc.identifier.scopus | eid_2-s2.0-84919819096 | - |
dc.identifier.volume | 10 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | 178 | - |
dc.identifier.epage | 189 | - |
dc.identifier.isi | WOS:000346751600008 | - |
dc.identifier.issnl | 1556-6013 | - |