This paper analyzed the existing anonymous authentication schemes which have the weakness of high calculation and communication cost and weak security. So we designed a secure and efficient anonymous authentication scheme to meet the need of the space network, which has the characteristic of resource limited, high exposure and intermittent connectivity. At first we proposed a signature algorithm based on certificateless public key cryptosystem and one-off public key, and then presented an anonymous authentication scheme according to the proposed signature algorithm, it needs two message interaction to complete the mutual authentication and key agreement. When the user has the illegal behavior, the service provider can reveal the illegal user's real identity through cooperation with the trusted center. Compared with the similar literature, the proposed scheme achieves high security with low computation and communication cost. (Abstract)
IntroductionThe space network structures with double plane of heaven and earth, which is based on the ground network and expanding with space-based network. The network consists of space-based backbone network, space-based access network, ground-based node network [1], so it has characteristics of heterogeneity, intermittent connectivity and high exposure. Compared with the traditional network, the space network is more easily attacked by eavesdropping, tampering and replay attack. The deployment of access authentication and privacy protection for the security of the space network is essential [2]. The space network of highly exposure makes it necessary for user real identity authentication when it needs to use the space network service. At the same time, network authentication needs to achieve anonymity and traceability in order to prevent the disclosure of privacy. What's more, it is necessary to reduce the computational overhead of the user and service provider for the resource limited space networks [2]. Last but not the least, the need to reduce the message length and minimize the number of interactions should also be considered for the characteristics of intermittent connectivity. Scholars at home and abroad have done a lot of research on anonymous authentication in the wireless networks. Liu et al. [3] proposed an anonymous authentication scheme using certificateless public key cryptosystem to achieve mutual authentication using MAC, and it used bilinear pairing to build the user index to achieve the connection between user identity and the index. Shim[4] presented a signature algorithm for vehicular sensor networks based on bilinear pairings, and a mutual authentication scheme was presented based on the algorithm, but it still required a large amount of calculation and had the key escrow problem. Hsieh et al.[5] proposed an anonymous protocol using self-certified public key technology and bilinear pairing for mobile user, the user and the service provider needed three message interaction to realize authentication and key agreement, but a lot of calculation was re...