Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems

被引:13
|
作者
Park, CS [1 ]
机构
[1] Dankook Univ, Dept Comp Sci, Cheonan 330714, South Korea
关键词
authentication; wireless; anonymity; error-correcting codes;
D O I
10.1016/j.comnet.2003.09.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A method of integrating user authentication with anonymity and untraceability is presented based on the secret-key certificate and the algebraic structure of error-correcting codes. Authentication protocol proposed here provides a means for the authentication server to avoid the requirement of maintaining a secure database of user secrets. Especially, since the proposed protocol uses a symmetric-key cryptography and eliminates the key management problem, it is efficient and convenient for both the hardware-limited users and the authentication server. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:267 / 273
页数:7
相关论文
共 50 条
  • [21] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080
  • [22] A novel user authentication scheme with anonymity for wireless communications
    Niu, Jianwei
    Li, Xiong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) : 1467 - 1476
  • [23] A user friendly authentication scheme with anonymity for wireless communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    Ha, Keum-Sook
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (03) : 356 - 364
  • [24] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    [J]. INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9
  • [25] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
  • [26] Mobile IP registration protocol with user anonymity
    Dang, Lan-Jun
    Kou, Wei-Dong
    Cao, Xue-Fei
    Fan, Kai
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2008, 35 (02): : 282 - 287
  • [27] A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
    Li, Xiong
    Niu, Jianwei
    Kumari, Saru
    Liao, Junguo
    Liang, Wei
    Khan, Muhammad Khurram
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2643 - 2655
  • [28] An enhanced 1-round authentication protocol for wireless body area networks with user anonymity
    Li, Xiong
    Peng, Jieyao
    Kumari, Saru
    Wu, Fan
    Karuppiah, Marimuthu
    Choo, Kim-Kwang Raymond
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 61 : 238 - 249
  • [29] A practical authentication protocol with anonymity for wireless access networks
    Chen, Yen-Cheng
    Chuang, Shu-Chuan
    Yeh, Lo-Yao
    Huang, Jiun-Long
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (10): : 1366 - 1375
  • [30] A lightweight authentication and key agreement protocol preserving user anonymity
    Morteza Nikooghadam
    Reza Jahantigh
    Hamed Arshad
    [J]. Multimedia Tools and Applications, 2017, 76 : 13401 - 13423