A new privacy and authentication protocol for end-to-end mobile users

SUMMARY In this papecr, we propose a new privacy and authentication scheme for end-to-end mobile users. There are three goals in our scheme. The first allows two end-to-end mobile users to communicate privately each other. The second allows two end-to-end mobile users to distribute a session key simply. The third allows two end-to-end mobile users to mutually authenticate. Copyright # 2003 John Wiley & Sons, Ltd.

[1]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[2]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[3]  Wei-Pang Yang,et al.  Enhanced privacy and authentication for the global system for mobile communications , 1999, Wirel. Networks.

[4]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[5]  Yuliang Zheng An Authentication and Security Protocol for Mobile Computing , 1996, IFIP World Conference on Mobile Communications.

[6]  Chris J. Mitchell,et al.  Comments on an optimized protocol for mobile network authentication and security , 1999, MOCO.

[7]  B. H. Yae,et al.  A scheduling scheme for the heterogeneous multimedia services in mobile broadband systems , 1997, Proceedings of 8th International Symposium on Personal, Indoor and Mobile Radio Communications - PIMRC '97.

[8]  Min-Shiang Hwang,et al.  Conference key distribution protocols for digital mobile communication systems , 1995 .

[9]  Stephen Hayes A standard for the OAM&P of PCS systems. , 1994, IEEE Personal Communications.

[10]  Xun Yi,et al.  An optimized protocol for mobile network authentication and security , 1998, MOCO.

[11]  Ashar Aziz,et al.  Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.

[12]  Min-Shiang Hwang,et al.  Authenticated key-exchange in a mobile radio network , 1997, Eur. Trans. Telecommun..

[13]  Cheng-Chi Lee,et al.  An Improvement of Mobile Users Authentication in the Integration Environments , 2002 .

[14]  Wei-Pang Yang,et al.  Conference Key Distribution Schemes for Secure Digital Mobile Communications , 1995, IEEE J. Sel. Areas Commun..