A Delegation-Based Unlinkable Authentication Protocol for Portable Communication Systems with Non-repudiation

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 260)


For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, User privacy protection, and non-repudiation. However, in all proposed protocols, the non-repudiation of mobile users is based on an impractical assumption that home location registers are trusted. To reduce the HLR’s trust assumption and enhance the non-repudiation of the mobile users, our new delegation-based authentication protocol is proposed. Our protocol also removes the exhaustive search problem in the subsequent login authentication to improve the subsequent login authentication performance. Moreover, the user unlinkability in the subsequent login authentication is also provided in our protocol to enhance the user identity privacy.


Delegation-based authentication Concurrent signatures Concurrent signcryption scheme Portable communication systems 


  1. 1.
    Lee W-B, Yeh C-K (2005) A new delegation-based authentication protocol for use in portable communication systems. IEEE Trans Wireless Commun 4(1):57–64CrossRefGoogle Scholar
  2. 2.
    Al-Tawill K, Akrami A, Youssef H (1999) A new authentication protocol for GSM networks. In: Proceedings of 23rd annual IEEE conference on local computer networks, pp 21–30Google Scholar
  3. 3.
    Lee C-H, Hwang M-S, Yang W-P (1999) Enhanced privacy and authentication for the global system for mobile communications. Wireless Netw 5(4):231–243CrossRefGoogle Scholar
  4. 4.
    Beller MJ, Chang L-F, Yacobi Y (1993) Privacy and authentication on a portable communication system. IEEE J Sel Areas Commun 11(6):821–829CrossRefGoogle Scholar
  5. 5.
    Lo C-C, Chen Y-J (1999) Secure communication mechanisms for GSM networks. IEEE Trans Consum Electron 45(4):1074–1080MathSciNetCrossRefGoogle Scholar
  6. 6.
    Lee T-F, Chang S-H, Hwang T, Chong SK (2009) Enhanced delegation-based authentication protocol for PCSs. IEEE Trans Wireless Commun 8(5):2166–2171CrossRefGoogle Scholar
  7. 7.
    Youn T-Y, Lim J (2011) Improved delegation-based authentication protocol for secure roaming service with unlinkability. IEEE Commun Lett 14(9):791–793CrossRefGoogle Scholar
  8. 8.
    Wang R-C, Juang W-S, Lei CL (2011) A privacy and delegation-enhanced user authentication protocol for portable communication systems. Int J Ad Hoc Ubiquitous Comput 6(3):183–190CrossRefGoogle Scholar
  9. 9.
    Hwang S.-J, You C.-H (2011) Weakness of Wang et al.’s privacy and delegation enhanced user authentication protocol for PCSs,” CSCIST 2011 and iCube 2011, Taipei, 2011Google Scholar
  10. 10.
    Chen H.-B, Lai Y.-H, Chen K.-W, Lee W.-B (2011) Enhanced delegation based authentication protocol for secure roaming service with synchronization. J Electronic Sci Technol 9(4), pp 345–351Google Scholar
  11. 11.
    Hwang S-J, Sung Y-H (2011) Confidential deniable authentication using promised signcryption. J Syst Softw 84:1652–1659CrossRefGoogle Scholar
  12. 12.
    Nguyen K (2005) Asymmetric concurrent signatures. In: Proceedings of information and communications security conference (ICICS 2005), LNCS 3783, Springer, New York, pp 181–193Google Scholar
  13. 13.
    Schnorr C (1991) Efficient signature generation by smart cards. J Cryptology 14(3), pp 161–174Google Scholar
  14. 14.
    Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptography 13(3), pp 361–396Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringTamkang UniversityTamsui, New Taipei CityTaiwan, Republic of China

Personalised recommendations