AKA Protocols for Mobile Communications

This paper proposes a modified signcryption scheme that provides signer anonymity. In addition, an efficient 2-pass authentication and key agreement protocol that uses the proposed signcryption scheme is presented for the mobile communication air-interface. The use of the modified scheme in the implementation of the ASPeCT protocol is demonstrated to generate a lower computational load than other methods. A modified ASPeCT protocol, which satisfies forward secrecy, is also proposed.

[1]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[2]  H. Petersen,et al.  Cryptanalysis and improvement of signcryption schemes , 1998 .

[3]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[4]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.

[5]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[6]  Burton S. Kaliski Advances in Cryptology - CRYPTO '97 , 1997 .

[7]  Ted Y. Joseph Personal communication services , 1992 .

[8]  Sang-Jae Moon,et al.  A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications , 1999, ICISC.

[9]  JooSeok Song,et al.  Information Security and Cryptology - ICISC’99 , 1999, Lecture Notes in Computer Science.

[10]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[11]  S-W Lee,et al.  Biologically Motivated Computer Vision , 2000, Lecture Notes in Computer Science.

[12]  Yuliang Zheng An Authentication and Security Protocol for Mobile Computing , 1996, IFIP World Conference on Mobile Communications.

[13]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[14]  M. Beller,et al.  Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .

[15]  Robert H. Deng,et al.  A Signcryption Scheme with Signature Directly Verifiable by Public Key , 1998, Public Key Cryptography.

[16]  Kwangjo Kim,et al.  Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme , 1999, ICISC.

[17]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[18]  Ulf Carlsen Optimal privacy and authentication on a portable communications system , 1994, OPSR.

[19]  Dieter Gollmann,et al.  Computer Security — ESORICS 98 , 1998, Lecture Notes in Computer Science.

[20]  Yuliang Zheng,et al.  Encrypted Message Authentication by Firewalls , 1999, Public Key Cryptography.

[21]  Colin Boyd,et al.  Forward Secrecy and Its Application to Future Mobile Communications Security , 2000, Public Key Cryptography.

[22]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[23]  Günther Horn,et al.  Authentication and Payment in Future Mobile Systems , 1998, J. Comput. Secur..

[24]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .