Fair Anonymous Authentication for Location Based Services

نویسندگان

  • Panayiotis Kotzanikolaou
  • Emmanouil Magkos
  • Nikolaos Petrakos
  • Christos Douligeris
  • Vassilios Chrissikopoulos
چکیده

We propose an efficient anonymous authentication scheme that provides untraceability and unlinkability of mobile devices, while accessing Location-Based Services. Following other recent approaches for mobile anonymity, in our scheme the network operator acts as an anonymous credential issuer for its users. However, our scheme supports credential non-transferability, without requiring embedded hardware security features. In addition it supports fairness characteristics. On one hand, it reduces the trust assumptions for the issuer by supporting nonframeability : the issuer, even in collaboration with the LBS provider, cannot simulate a transaction that opens back to an honest user. On the other hand, it supports anonymity revocation for illegally used credentials. Our scheme uses standard primitives such as zero-knowledge proofs, MACs and challenge/responses. We provide formal security proofs based on the intractability of the Divisible Diffie-Hellman assumption.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of Authentication in Roaming Service

In mobile communications, roaming means a device going from its home location to different location where it will connect to a foreign network for services. Secure authentication in roaming services is being designed to allow legal users to get access to wireless network services when they are away from their home location. Recently, to protect the location privacy of the user s there have been...

متن کامل

ALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks

The integration of mobile IPv6 heterogeneous networks enhances networking performance; however, it also breaks mobile node’s anonymity and location privacy. In this paper, we propose an anonymous and location privacy preserving (ALPP) scheme that consists of two complementary subschemes: anonymous home binding update and anonymous return routability. In addition, anonymous mutual authentication...

متن کامل

Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property....

متن کامل

Data-Minimizing Authentication Goes Mobile

Authentication is a prerequisite for proper access control to many e-services. Often, it is carried out by identifying the user, while generally, verification of certified attributes would suffice. Even worse, this kind of authentication makes all the user’s transactions linkable and discloses an excessive amount of personal information, and thus erodes the user’s privacy. This is in clear cont...

متن کامل

Achieving User Privacy in Mobile Networks

Third generation mobile networks aim to offer ‘any service, anywhere, at any time’. User require privacy within these systems in order to feel confident of their use. Privacy requirements {in mobile networks) are: content, location, and identification privacy, and authentication. Differing from previous approaches to privacy, the network itself is considered to be an untrusted party. This paper...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012