A secure and efficient authentication protocol for anonymous channel in wireless communications

For enhancing the efficiency and the security in anonymous channel of wireless systems, many protocols were proposed. However, most of them employed asymmetric cryptosystems to protect the identity of the mobile user. As we know, the drawbacks of asymmetric cryptosystem are complex and high computation cost. Therefore, if the wireless system is based on asymmetric cryptosystem, that is not convenience for the mobile device and infrastructure. Not only that, an important problem also exists in the previous protocols. That is when the mobile user copies his anonymous ticket and shares it with friends, the visiting network cannot discriminate the copy of the ticket. That seriously effects the right of the visiting network. In this paper, we shall propose a secure and efficient authentication protocol to withstand the above weakness without employing any asymmetric cryptosystems.

[1]  Jinn-ke Jan,et al.  A wireless-based authentication and anonymous channels for large scale area , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.

[2]  W.-S. Juang,et al.  Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..

[3]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.

[4]  Lein Harn,et al.  Authentication in wireless communications , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.

[5]  Chin-Chen Chang,et al.  A flexible date-attachment scheme on e-cash , 2003, Comput. Secur..

[6]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[7]  Günther Horn,et al.  Authentication and Payment in Future Mobile Systems , 1998, J. Comput. Secur..

[8]  Min-Shiang Hwang,et al.  A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem , 2003, Comput. Stand. Interfaces.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[11]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[12]  Birgit Pfitzmann,et al.  Breaking Efficient Anonymous Channel , 1994, EUROCRYPT.

[13]  Jinn-ke Jan,et al.  A secure electronic voting protocol with IC cards , 1997, J. Syst. Softw..

[14]  Ana M. Barbancho,et al.  Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications , 2003, Comput. Networks.