Identity-Based Edge Computing Anonymous Authentication Protocol
نویسندگان
چکیده
With the development of sensor technology and wireless communication technology, edge computing has a wider range applications. The privacy protection is great significance. In system, in order to ensure credibility source terminal data, mobile (MEC) needs verify signature node on data. During process, power devices such as terminals can easily become bottleneck system performance. Therefore, it very necessary improve efficiency through computational offloading. this paper proposes an identity-based anonymous authentication protocol. protocol realizes mutual obtains shared key by encrypting information. encryption algorithm implemented thresholded proxy ring signature. When large number offload computing, MEC set priority offloading tasks according user’s identity permissions, thereby improving efficiency. Security analysis shows that scheme guarantee anonymity unforgeability signatures. probability malicious forging equivalent cracking discrete logarithm puzzle. According analysis, case offloading, complexity significantly reduced, liberated, improved.
منابع مشابه
Identity-Based Authentication for Cloud Computing
Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL Authentication Protocol (SAP), once applied in cloud computing, will become so complicated that users will undergo a heavily loaded p...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملServer-aided anonymous attribute-based authentication in cloud computing
The notion of attribute-based signature is one of the important security primitives to realize anonymous authentication. In an attribute based signature (ABS), users can generate a signature on a message with their attributes.With this signature, any verifier will be convinced that such a signature is generated from a signer with these attributes. However, the identity of the signers will be hi...
متن کاملAnonymous Group Message Authentication Protocol for LTE-based V2X Communications
Correspondence Dongxiao Liu, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo Canada N2L 3G1 Email: [email protected] Cellular technologies, in particular the current long-term evolution (LTE) and future 5G, are suitable for implementing vehicle-to-everything (V2X) services, due to the existing network infrastructure, device-to-device (D2D) communicati...
متن کاملAnonymous Roaming Authentication Protocol with ID-Based Signatures
We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the user can prove his/her roaming legality without letting the server know his/her real identity. We employ the ID-based signature technique and secret sharing ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2023
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2023.029711