2019 International Conference on Advanced Communication Technologies and Networking (CommNet) 2019
DOI: 10.1109/commnet.2019.8742367
|View full text |Cite
|
Sign up to set email alerts
|

An access authentication algorithm based on a hierarchical identity-based signature over lattice for the space-ground integrated network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…However, the schemes in [36] and [37] fail to achieve some critical security properties, such as unlinkability and perfect forward/backward secrecy (PFS/PBS). Yi et al [38] and Ma et al [39] respectively proposed two AKA schemes using lattice-based cryptography to overcome the insufficiencies of existing access authentication methods in SATCOM system, such as high computational complexity, large authentication delay and no resistance to quantum attack. In 2020, Yao et al [40] proposed an identity-based mutual authentication scheme (IMAS) with the adoption of multicast authentication, which greatly reduced the authentication computation delay and signalling overhead.…”
Section: B Authentication and Key Agreement (Aka)mentioning
confidence: 99%
See 1 more Smart Citation
“…However, the schemes in [36] and [37] fail to achieve some critical security properties, such as unlinkability and perfect forward/backward secrecy (PFS/PBS). Yi et al [38] and Ma et al [39] respectively proposed two AKA schemes using lattice-based cryptography to overcome the insufficiencies of existing access authentication methods in SATCOM system, such as high computational complexity, large authentication delay and no resistance to quantum attack. In 2020, Yao et al [40] proposed an identity-based mutual authentication scheme (IMAS) with the adoption of multicast authentication, which greatly reduced the authentication computation delay and signalling overhead.…”
Section: B Authentication and Key Agreement (Aka)mentioning
confidence: 99%
“…In 2020, Yao et al [40] proposed an identity-based mutual authentication scheme (IMAS) with the adoption of multicast authentication, which greatly reduced the authentication computation delay and signalling overhead. However, these identity-based AKA schemes [36], [37], [38], [39], [40] face the potential threats from Private Key Generator (PKG) and private key escrow problems. Therefore, based on this fact, Guan et al [41] proposed a blockchain-assisted secure and lightweight authentication (BSLA) scheme which introduces the blockchain to solve the key escrow problem caused by the centralized PKG in the registration phase of the traditional identity-based AKA mechanisms.…”
Section: B Authentication and Key Agreement (Aka)mentioning
confidence: 99%