Anonymous Roaming Authentication Protocol with ID-Based Signatures

نویسنده

  • Lih-Chyau Wuu
چکیده

We propose an off-line roaming authentication protocol which not only the server in a foreign network authenticates any roaming user without the involvement of the home network, but also the anonymity of the user is preserved. That is, the user can prove his/her roaming legality without letting the server know his/her real identity. We employ the ID-based signature technique and secret sharing technique to provide the user anonymity and nonrepudiation of roaming service during the mutual authentication process. The proposed scheme only requires two messages exchanged between the roaming user and the server, and a polynomial function is designed to revoke the roaming service of an illegal user.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of Authentication in Roaming Service

In mobile communications, roaming means a device going from its home location to different location where it will connect to a foreign network for services. Secure authentication in roaming services is being designed to allow legal users to get access to wireless network services when they are away from their home location. Recently, to protect the location privacy of the user s there have been...

متن کامل

An Improved Anonymous Authentication Scheme for Roaming Services

In wireless network and mobile network, a two-factor authentication scheme for roaming services enables a mobile user to achieve mutual authentication and key agreement with the foreign agent. In this paper, we review Kim et al.’s anonymous authentication scheme in global mobility networks. Analysis shows that Kim et al.’s scheme fails to achieve anonymity and two-factor authentication. In addi...

متن کامل

Anonymous roaming in universal mobile telecommunication system mobile networks

A secure roaming protocol for mobile networks is proposed. Roaming has been analysed in some schemes from the security point of view; however, there are vulnerabilities in most of them and so the claimed security level is not achieved. The scheme offered by Wan et al. recently is based on hierarchical identity-based encryption, in which the roaming user and the foreign network mutually authenti...

متن کامل

A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks

In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in global mobility networks. This scheme can protect user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret informat...

متن کامل

Implementation of Anonymous and Secure Communication System With Group Signatures: A Review

-For Privacy Preserving Communications Both Anonymity and end to end encryption mechanism is essential. Identity Based Encryption technique is best suitable for secure and anonymous communications. For solving anonymous and secure communication problems both cryptographic and IBE based protocols needed which governs the proper communication between two parties. For the purpose of authentication...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006