A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems

Recently, Lee et al. proposed a security enhanced delegation-based authentication protocol for Portable Communication Systems (PCSs). The major merits include: 1) the privacy protection of Mobile User (MS); 2) MS can construct a digital signature to prove the requests; 3) the satisfaction of some security properties; 4) the mutual authentication between MS and the Visited Location Register (VLR); 5) low computation and communication cost of MS. We then show that the privacy of MS is not kept and the overcharge problem exists in Lee et al.'s protocol and propose a method to enhance the delegation and security level and to keep the same efficiency.

[1]  Tzonelih Hwang,et al.  Enhanced delegation-based authentication protocol for PCSs , 2009, IEEE Transactions on Wireless Communications.

[2]  Dongdai Lin,et al.  ID-based designated-verifier proxy signatures , 2005 .

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Chin-Chen Chang,et al.  An ElGamal-Like Cryptosystem for Enciphering Large Messages , 2002, IEEE Trans. Knowl. Data Eng..

[5]  Huaqun Wang,et al.  Cryptanalysis of a Generalized Ring Signature Scheme , 2009, IEEE Transactions on Dependable and Secure Computing.

[6]  L. Harn,et al.  A non-repudiation metering scheme , 2001, IEEE Communications Letters.

[7]  W. Baocang,et al.  Public key cryptosystem based on two cryptographic assumptions , 2005 .

[8]  M. Rahnema,et al.  Overview of the GSM system and protocol architecture , 1993, IEEE Communications Magazine.

[9]  Johann van der Merwe,et al.  A Fully Distributed Proactively Secure Threshold-Multisignature Scheme , 2007, IEEE Transactions on Parallel and Distributed Systems.

[10]  Wei-Bin Lee,et al.  A new delegation-based authentication protocol for use in portable communication systems , 2005, IEEE Transactions on Wireless Communications.