Title :
Identity Authentication Scheme for the Distributed Centers System
Author_Institution :
Beijing Univ. of Posts & Telecommun., Beijing, China
Abstract :
VoIP is popularly used recently, and it will be more popular in the future. However, the security of VoIP is still a problem. There is no identity authentication in these services. According to the property of this system, a distributed trusted centers (TCS) system is proposed. In this paper, we propose a new solution for the authentication of all TCS. It keeps TCS legal, in the meanwhile, it makes the management of TCS convenient. This scheme prevents the replay attack and the identity impersonation attack. It also has perfect forward secrecy.
Keywords :
Internet telephony; telecommunication security; VoIP; distributed centers system; identity authentication scheme; identity impersonation attack; perfect forward secrecy; replay attack; Additives; Authentication; Elliptic curves; Galois fields; Identity management systems; Internet; Law; Legal factors; Protocols; Security;
Conference_Titel :
Image and Signal Processing, 2009. CISP '09. 2nd International Congress on
Conference_Location :
Tianjin
Print_ISBN :
978-1-4244-4129-7
Electronic_ISBN :
978-1-4244-4131-0
DOI :
10.1109/CISP.2009.5303989