Skip to main content

2014 | OriginalPaper | Buchkapitel

A Delegation-Based Unlinkable Authentication Protocol for Portable Communication Systems with Non-repudiation

verfasst von : Shin-Jia Hwang, Cheng-Han You

Erschienen in: Advanced Technologies, Embedded and Multimedia for Human-centric Computing

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, User privacy protection, and non-repudiation. However, in all proposed protocols, the non-repudiation of mobile users is based on an impractical assumption that home location registers are trusted. To reduce the HLR’s trust assumption and enhance the non-repudiation of the mobile users, our new delegation-based authentication protocol is proposed. Our protocol also removes the exhaustive search problem in the subsequent login authentication to improve the subsequent login authentication performance. Moreover, the user unlinkability in the subsequent login authentication is also provided in our protocol to enhance the user identity privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lee W-B, Yeh C-K (2005) A new delegation-based authentication protocol for use in portable communication systems. IEEE Trans Wireless Commun 4(1):57–64CrossRef Lee W-B, Yeh C-K (2005) A new delegation-based authentication protocol for use in portable communication systems. IEEE Trans Wireless Commun 4(1):57–64CrossRef
2.
Zurück zum Zitat Al-Tawill K, Akrami A, Youssef H (1999) A new authentication protocol for GSM networks. In: Proceedings of 23rd annual IEEE conference on local computer networks, pp 21–30 Al-Tawill K, Akrami A, Youssef H (1999) A new authentication protocol for GSM networks. In: Proceedings of 23rd annual IEEE conference on local computer networks, pp 21–30
3.
Zurück zum Zitat Lee C-H, Hwang M-S, Yang W-P (1999) Enhanced privacy and authentication for the global system for mobile communications. Wireless Netw 5(4):231–243CrossRef Lee C-H, Hwang M-S, Yang W-P (1999) Enhanced privacy and authentication for the global system for mobile communications. Wireless Netw 5(4):231–243CrossRef
4.
Zurück zum Zitat Beller MJ, Chang L-F, Yacobi Y (1993) Privacy and authentication on a portable communication system. IEEE J Sel Areas Commun 11(6):821–829CrossRef Beller MJ, Chang L-F, Yacobi Y (1993) Privacy and authentication on a portable communication system. IEEE J Sel Areas Commun 11(6):821–829CrossRef
5.
Zurück zum Zitat Lo C-C, Chen Y-J (1999) Secure communication mechanisms for GSM networks. IEEE Trans Consum Electron 45(4):1074–1080MathSciNetCrossRef Lo C-C, Chen Y-J (1999) Secure communication mechanisms for GSM networks. IEEE Trans Consum Electron 45(4):1074–1080MathSciNetCrossRef
6.
Zurück zum Zitat Lee T-F, Chang S-H, Hwang T, Chong SK (2009) Enhanced delegation-based authentication protocol for PCSs. IEEE Trans Wireless Commun 8(5):2166–2171CrossRef Lee T-F, Chang S-H, Hwang T, Chong SK (2009) Enhanced delegation-based authentication protocol for PCSs. IEEE Trans Wireless Commun 8(5):2166–2171CrossRef
7.
Zurück zum Zitat Youn T-Y, Lim J (2011) Improved delegation-based authentication protocol for secure roaming service with unlinkability. IEEE Commun Lett 14(9):791–793CrossRef Youn T-Y, Lim J (2011) Improved delegation-based authentication protocol for secure roaming service with unlinkability. IEEE Commun Lett 14(9):791–793CrossRef
8.
Zurück zum Zitat Wang R-C, Juang W-S, Lei CL (2011) A privacy and delegation-enhanced user authentication protocol for portable communication systems. Int J Ad Hoc Ubiquitous Comput 6(3):183–190CrossRef Wang R-C, Juang W-S, Lei CL (2011) A privacy and delegation-enhanced user authentication protocol for portable communication systems. Int J Ad Hoc Ubiquitous Comput 6(3):183–190CrossRef
9.
Zurück zum Zitat Hwang S.-J, You C.-H (2011) Weakness of Wang et al.’s privacy and delegation enhanced user authentication protocol for PCSs,” CSCIST 2011 and iCube 2011, Taipei, 2011 Hwang S.-J, You C.-H (2011) Weakness of Wang et al.’s privacy and delegation enhanced user authentication protocol for PCSs,” CSCIST 2011 and iCube 2011, Taipei, 2011
10.
Zurück zum Zitat Chen H.-B, Lai Y.-H, Chen K.-W, Lee W.-B (2011) Enhanced delegation based authentication protocol for secure roaming service with synchronization. J Electronic Sci Technol 9(4), pp 345–351 Chen H.-B, Lai Y.-H, Chen K.-W, Lee W.-B (2011) Enhanced delegation based authentication protocol for secure roaming service with synchronization. J Electronic Sci Technol 9(4), pp 345–351
11.
Zurück zum Zitat Hwang S-J, Sung Y-H (2011) Confidential deniable authentication using promised signcryption. J Syst Softw 84:1652–1659CrossRef Hwang S-J, Sung Y-H (2011) Confidential deniable authentication using promised signcryption. J Syst Softw 84:1652–1659CrossRef
12.
Zurück zum Zitat Nguyen K (2005) Asymmetric concurrent signatures. In: Proceedings of information and communications security conference (ICICS 2005), LNCS 3783, Springer, New York, pp 181–193 Nguyen K (2005) Asymmetric concurrent signatures. In: Proceedings of information and communications security conference (ICICS 2005), LNCS 3783, Springer, New York, pp 181–193
13.
Zurück zum Zitat Schnorr C (1991) Efficient signature generation by smart cards. J Cryptology 14(3), pp 161–174 Schnorr C (1991) Efficient signature generation by smart cards. J Cryptology 14(3), pp 161–174
14.
Zurück zum Zitat Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptography 13(3), pp 361–396 Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptography 13(3), pp 361–396
Metadaten
Titel
A Delegation-Based Unlinkable Authentication Protocol for Portable Communication Systems with Non-repudiation
verfasst von
Shin-Jia Hwang
Cheng-Han You
Copyright-Jahr
2014
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-7262-5_105

Neuer Inhalt