Fair Anonymous Authentication for Location Based Services
نویسندگان
چکیده
We propose an efficient anonymous authentication scheme that provides untraceability and unlinkability of mobile devices, while accessing Location-Based Services. Following other recent approaches for mobile anonymity, in our scheme the network operator acts as an anonymous credential issuer for its users. However, our scheme supports credential non-transferability, without requiring embedded hardware security features. In addition it supports fairness characteristics. On one hand, it reduces the trust assumptions for the issuer by supporting nonframeability : the issuer, even in collaboration with the LBS provider, cannot simulate a transaction that opens back to an honest user. On the other hand, it supports anonymity revocation for illegally used credentials. Our scheme uses standard primitives such as zero-knowledge proofs, MACs and challenge/responses. We provide formal security proofs based on the intractability of the Divisible Diffie-Hellman assumption.
منابع مشابه
Review of Authentication in Roaming Service
In mobile communications, roaming means a device going from its home location to different location where it will connect to a foreign network for services. Secure authentication in roaming services is being designed to allow legal users to get access to wireless network services when they are away from their home location. Recently, to protect the location privacy of the user s there have been...
متن کاملALPP: anonymous and location privacy preserving scheme for mobile IPv6 heterogeneous networks
The integration of mobile IPv6 heterogeneous networks enhances networking performance; however, it also breaks mobile node’s anonymity and location privacy. In this paper, we propose an anonymous and location privacy preserving (ALPP) scheme that consists of two complementary subschemes: anonymous home binding update and anonymous return routability. In addition, anonymous mutual authentication...
متن کاملFormal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy
Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property....
متن کاملData-Minimizing Authentication Goes Mobile
Authentication is a prerequisite for proper access control to many e-services. Often, it is carried out by identifying the user, while generally, verification of certified attributes would suffice. Even worse, this kind of authentication makes all the user’s transactions linkable and discloses an excessive amount of personal information, and thus erodes the user’s privacy. This is in clear cont...
متن کاملAchieving User Privacy in Mobile Networks
Third generation mobile networks aim to offer ‘any service, anywhere, at any time’. User require privacy within these systems in order to feel confident of their use. Privacy requirements {in mobile networks) are: content, location, and identification privacy, and authentication. Differing from previous approaches to privacy, the network itself is considered to be an untrusted party. This paper...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012