File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Time-bound anonymous authentication for roaming networks

TitleTime-bound anonymous authentication for roaming networks
Authors
Keywordsauthentication
applied cryptography
anonymous roaming
Accountable privacy
revocation
privacy
Issue Date2015
Citation
IEEE Transactions on Information Forensics and Security, 2015, v. 10, n. 1, p. 178-189 How to Cite?
Abstract© 2014 IEEE. We propose an anonymous authentication protocol that supports time-bound credentials for an efficient revocation. It is especially suitable for large-scale network in roaming scenario. With our newly designed group signature scheme as a building block, a timestamp can be embedded to user secret key. No expired key can be used to authenticate, and hence naturally revoked users (e.g., due to contract expiration) are not required to be put into the revocation list. This makes our protocol much faster than previous roaming protocols in terms of revocation checking, which is a main part in verification.
Persistent Identifierhttp://hdl.handle.net/10722/280561
ISSN
2023 Impact Factor: 6.3
2023 SCImago Journal Rankings: 2.890
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorLiu, Joseph K.-
dc.contributor.authorChu, Cheng Kang-
dc.contributor.authorChow, Sherman S.M.-
dc.contributor.authorHuang, Xinyi-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorZhou, Jianying-
dc.date.accessioned2020-02-17T14:34:21Z-
dc.date.available2020-02-17T14:34:21Z-
dc.date.issued2015-
dc.identifier.citationIEEE Transactions on Information Forensics and Security, 2015, v. 10, n. 1, p. 178-189-
dc.identifier.issn1556-6013-
dc.identifier.urihttp://hdl.handle.net/10722/280561-
dc.description.abstract© 2014 IEEE. We propose an anonymous authentication protocol that supports time-bound credentials for an efficient revocation. It is especially suitable for large-scale network in roaming scenario. With our newly designed group signature scheme as a building block, a timestamp can be embedded to user secret key. No expired key can be used to authenticate, and hence naturally revoked users (e.g., due to contract expiration) are not required to be put into the revocation list. This makes our protocol much faster than previous roaming protocols in terms of revocation checking, which is a main part in verification.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Information Forensics and Security-
dc.subjectauthentication-
dc.subjectapplied cryptography-
dc.subjectanonymous roaming-
dc.subjectAccountable privacy-
dc.subjectrevocation-
dc.subjectprivacy-
dc.titleTime-bound anonymous authentication for roaming networks-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TIFS.2014.2366300-
dc.identifier.scopuseid_2-s2.0-84919819096-
dc.identifier.volume10-
dc.identifier.issue1-
dc.identifier.spage178-
dc.identifier.epage189-
dc.identifier.isiWOS:000346751600008-
dc.identifier.issnl1556-6013-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats