Authentication and payment in future mobile systems

This article presents an efficient public-key protocol for mutual authentication and key exchange designed for future mobile communications systems. The paper also demonstrates how a micropayment scheme can be integrated into the authentication protocols this payment protocol allows for the provision of incontestable charging. The problem of establishing authenticated public keys through cross-certification is addressed.

[1]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[2]  Adi Shamir,et al.  PayWord and MicroMint: Two Simple Micropayment Schemes , 1996, Security Protocols Workshop.

[3]  Günther Horn,et al.  Secure Billing for Mobile Information Services in UMTS , 1998, IS&N.

[4]  Jean-Sébastien Coron,et al.  On the Security of RSA Padding , 1999, CRYPTO.

[5]  Colin Boyd,et al.  Public key protocols for wireless communications , 1998, ICISC.

[6]  Xun Yi,et al.  An optimized protocol for mobile network authentication and security , 1998, MOCO.

[7]  Ashar Aziz,et al.  Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.

[8]  Yi Mu,et al.  On the design of security protocols for mobile communications , 1996, ACISP.

[9]  Klaus Vedder Security Aspects of Mobile Communications , 1991, Computer Security and Industrial Cryptography.

[10]  Ralf Hauser,et al.  Micro-Payments based on iKP , 1996 .

[11]  Torben P. Pedersen Electronic Payments of Small Amounts , 1995, Security Protocols Workshop.

[12]  Lein Harn,et al.  Authentication in wireless communications , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.

[13]  Joos Vandewalle,et al.  On the time-memory tradeoff between exhaustive key search and table precomputation , 1998 .

[14]  Günther Horn,et al.  Authentication and Payment in Future Mobile Systems , 1998, J. Comput. Secur..

[15]  Bart Preneel,et al.  RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.

[16]  Rainer A. Rueppel,et al.  Modern key agreement techniques , 1994, Comput. Commun..

[17]  Chang-Seop Park On certificate-based security protocols for wireless mobile communication systems , 1997 .

[18]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[19]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[20]  Jianying Zhou,et al.  Undeniable billing in mobile communication , 1998, MobiCom '98.

[21]  Paul C. van Oorschot,et al.  Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..

[22]  Martin E. Hellman,et al.  A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.

[23]  Chris J. Mitchell,et al.  Key control in key agreement protocols , 1998 .

[24]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[25]  Antoon Bosselaers,et al.  Collisions for the Compressin Function of MD5 , 1994, EUROCRYPT.

[26]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.