Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Hi-index | 0.00 |
Security of heterogeneous wireless network is the research hotspot now. Aiming at the security problems of access authentication for heterogeneous wireless network, an access authentication scheme based on CPK technology is presented. The access authentication model is based on CPK technology to realize identity authentication, temporary authentication identity is introduced to protect user privacy and provide anonymous service. The authentication and key agreement function is enhanced by the improved ECDH algorithm in the proposed access authentication protocol. By security and performance analysis, this scheme has higher security attributes and better performance.