Zhao YuanChao, Li DaoBen. The Enhanced Methods of User Identity's Confidentiality in Mobile Communication[J]. Journal of Electronics & Information Technology, 2005, 27(9): 1459-1462.
Citation:
Zhao YuanChao, Li DaoBen. The Enhanced Methods of User Identity's Confidentiality in Mobile Communication[J]. Journal of Electronics & Information Technology, 2005, 27(9): 1459-1462.
Zhao YuanChao, Li DaoBen. The Enhanced Methods of User Identity's Confidentiality in Mobile Communication[J]. Journal of Electronics & Information Technology, 2005, 27(9): 1459-1462.
Citation:
Zhao YuanChao, Li DaoBen. The Enhanced Methods of User Identity's Confidentiality in Mobile Communication[J]. Journal of Electronics & Information Technology, 2005, 27(9): 1459-1462.
Focused on the scenario that none of the current standards achieves user identity's confidentiality, two enhanced methods are proposed, respectively based on public key cryptography and symmetric key cryptography, in which each user's real identity is concealed among many users' identities. So attackers can not capture the concrete identity information and user identity confidentiality is improved obviously. The performance of the two methods is analyzed and compared. And the proposed methods can be used in other mobile communication technologies.
赖溪松,韩亮,张真诚,张玉清,肖国镇改编.计算机密码学及其应用.北京:国防工业出版社,2001:178-184.[2]3GPP TS 33.102 (V6.0.0): 3rd Generation Partnership Project(3GPP); Technical Specification Group (TSG) SA; 3G Security;Security Architecture. Sep. 2003, URL: http:∥www.3gpp.org/ftp/Specs/archive/33_series/33.102/[3]Rhee M Y著,袁超伟等译.CDMA蜂窝移动通信与网络安全.北京:电子工业出版社,2002:241-243.[4]Stinson D R著,冯登国译.密码学原理与实践.北京:电子工业出版社,2003:172-176.[5]Curtis H W. Subscriber authentication and security in digital cellular networks and under the mobile Internet protocol. [Master Thesis], The University of Texas at Austin, May 2001, URL:http:∥www. portelligent.com/forms/HCThesis.pdf