Research on 5G Anonymous Authentication Technology based on Group Signatures
Conference: ISCTT 2021 - 6th International Conference on Information Science, Computer Technology and Transportation
11/26/2021 - 11/28/2021 at Xishuangbanna, China
Proceedings: ISCTT 2021
Pages: 9Language: englishTyp: PDF
Personal VDE Members are entitled to a 10% discount on this title
Authors:
Hao, Qianfang; Sun, Lei; Zhao, Kun; Song, Yunfan; Wang, Miao; Han, Songshen (Information Engineering University, Zhengzhou, China)
Abstract:
With the gradual advancement of 5G technology in daily life, smart phones and various wearable devices have a more profound impact on our lives. These devices collect a large amount of personal privacy information of users. The vertical application services in the 5G data network can use this information to provide users with more high-quality and user-friendly services, and they can also use and disclose users' private information for personal gain. At the same time, users' personal information stored in third-party service providers may also be stolen by outside attackers. Aiming at the problem of user identity privacy leakage in the 5G network, the unified authentication architecture and group signatures technology are combined to design an anonymous authentication protocol to realize the anonymous authentication between the user and the secondary authentication server. At the same time, users can track their identities when they have illegal behaviors. Finally, this paper uses BAN logic to formally analyze and proves the security of the anonymous authentication protocol, and test the actual cost of group signatures.