Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications

Smart and tiny mobile phones are widely popularized and advanced mobile communication services are provided increasingly such that ubiquitous computing environments will come true soon. It is a pleasure for mobile users to work or get recreations in the mobile network environments. However, just as the cases in wireline networks, there are many security threats to mobile network systems and their impact on the security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property in mobile network systems. The secret personal information, important data, or classified documents which mobile users carry may be stolen by malicious entities. In order to guarantee the quality of the advanced communication services, the security and privacy would be important issues when mobile users roam to the mobile networks. In this paper, an anonymous authentication scheme will be proposed to protect both the security of the mobile network system and the privacy of mobile users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also the identity of each user can be kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still make correct bills to charge these anonymous users. Finally, our protocols also achieve the goal of fair privacy which allows the judge to be able to revoke the anonymity and trace the illegal users when they misused the anonymity property such as they committed crimes.

[1]  David Chaum,et al.  Blind Signature System , 1983, CRYPTO.

[2]  Jianfeng Ma,et al.  A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..

[3]  Markus Jakobsson,et al.  Revokable and versatile electronic money (extended abstract) , 1996, CCS '96.

[4]  Dogan Kesdogan,et al.  Secure location information management in cellular radio systems , 1995, IEEE Wireless Communication System Symposium.

[5]  Jan Camenisch,et al.  An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..

[6]  Chin-Chen Chang,et al.  A self-encryption mechanism for authentication of roaming and teleconference services , 2003, IEEE Trans. Wirel. Commun..

[7]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[8]  Yi Mu,et al.  A new scheme of credit based payment for electronic commerce , 1998, Proceedings 23rd Annual Conference on Local Computer Networks. LCN'98 (Cat. No.98TB100260).

[9]  Hung-Wen Yang,et al.  A secure and efficient authentication protocol for anonymous channel in wireless communications , 2005, Appl. Math. Comput..

[10]  N. Asokan,et al.  Anonymity in a Mobile Computing Environment , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[11]  Konrad S. Wrona,et al.  Fair electronic cash withdrawal and change return for wireless networks , 2001, WMC '01.

[12]  Aggelos Kiayias,et al.  A Solution for Wireless Privacy and Payments based on E-cash , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[13]  Qi He,et al.  The quest for personal control over mobile location privacy , 2004, IEEE Communications Magazine.

[14]  Maximilian Ott,et al.  Source-location privacy for networks of energy-constrained sensors , 2004 .

[15]  Young Ik Eom,et al.  An efficient authentication protocol supporting privacy in mobile computing environments , 2002, 5th IEEE International Conference on High Speed Networks and Multimedia Communication (Cat. No.02EX612).

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[17]  Jinn-ke Jan,et al.  A wireless-based authentication and anonymous channels for large scale area , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.

[18]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.