Identity-Based Edge Computing Anonymous Authentication Protocol

نویسندگان

چکیده

With the development of sensor technology and wireless communication technology, edge computing has a wider range applications. The privacy protection is great significance. In system, in order to ensure credibility source terminal data, mobile (MEC) needs verify signature node on data. During process, power devices such as terminals can easily become bottleneck system performance. Therefore, it very necessary improve efficiency through computational offloading. this paper proposes an identity-based anonymous authentication protocol. protocol realizes mutual obtains shared key by encrypting information. encryption algorithm implemented thresholded proxy ring signature. When large number offload computing, MEC set priority offloading tasks according user’s identity permissions, thereby improving efficiency. Security analysis shows that scheme guarantee anonymity unforgeability signatures. probability malicious forging equivalent cracking discrete logarithm puzzle. According analysis, case offloading, complexity significantly reduced, liberated, improved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity-Based Authentication for Cloud Computing

Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded p...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Server-aided anonymous attribute-based authentication in cloud computing

The notion of attribute-based signature is one of the important security primitives to realize anonymous authentication. In an attribute based signature (ABS), users can generate a signature on a message with their attributes.With this signature, any verifier will be convinced that such a signature is generated from a signer with these attributes. However, the identity of the signers will be hi...

متن کامل

Anonymous Group Message Authentication Protocol for LTE-based V2X Communications

Correspondence Dongxiao Liu, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo Canada N2L 3G1 Email: [email protected] Cellular technologies, in particular the current long-term evolution (LTE) and future 5G, are suitable for implementing vehicle-to-everything (V2X) services, due to the existing network infrastructure, device-to-device (D2D) communicati...

متن کامل

Anonymous Roaming Authentication Protocol with ID-Based Signatures

We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the user can prove his/her roaming legality without letting the server know his/her real identity. We employ the ID-based signature technique and secret sharing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2023

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2023.029711