A wireless-based authentication and anonymous channels for large scale area

Network technology that can support user mobility has prompted anonymous requirement. We describe an efficient anonymous channel protocol for large scale area in wireless communications. With the e-service it is expected that in the near future, portable communications systems will provide many applications in e-commerce. However, on a large scale area, the transaction data and handoff events are very large. Our mobile user uses an anonymous channel ticket without connecting to the home domain, and visit domain authentication for the mobile user without any information form home domain, so our method is suitable for a large scale area. We can also reduce the computational cost in the anonymous channel ticket authentication phase.

[1]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  M. Beller,et al.  Fully-fledged two-way public key authentication and key agreement for low-cost terminals , 1993 .

[4]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.

[5]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[6]  Shoji Miyaguchi,et al.  The FEAL Cipher Family , 1990, CRYPTO.

[7]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[8]  David M'Raïhi,et al.  Cryptographic smart cards , 1996, IEEE Micro.

[9]  Ulf Carlsen Optimal privacy and authentication on a portable communications system , 1994, OPSR.

[10]  Birgit Pfitzmann,et al.  Breaking Efficient Anonymous Channel , 1994, EUROCRYPT.

[11]  W.-S. Juang,et al.  Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..

[12]  Kaoru Kurosawa,et al.  Efficient Anonymous Channel and All/Nothing Election Scheme , 1994, EUROCRYPT.

[13]  Liu Jianwei,et al.  A user authentication protocol for digital mobile communication network , 1995, Proceedings of 6th International Symposium on Personal, Indoor and Mobile Radio Communications.

[14]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[15]  Miles E. Smid,et al.  The Data Encryption Standard , 1988 .