Abstract
For portable communication systems, the delegation-based authentication protocol provides efficient subsequent login authentication, data confidentiality, User privacy protection, and non-repudiation. However, in all proposed protocols, the non-repudiation of mobile users is based on an impractical assumption that home location registers are trusted. To reduce the HLR’s trust assumption and enhance the non-repudiation of the mobile users, our new delegation-based authentication protocol is proposed. Our protocol also removes the exhaustive search problem in the subsequent login authentication to improve the subsequent login authentication performance. Moreover, the user unlinkability in the subsequent login authentication is also provided in our protocol to enhance the user identity privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lee W-B, Yeh C-K (2005) A new delegation-based authentication protocol for use in portable communication systems. IEEE Trans Wireless Commun 4(1):57–64
Al-Tawill K, Akrami A, Youssef H (1999) A new authentication protocol for GSM networks. In: Proceedings of 23rd annual IEEE conference on local computer networks, pp 21–30
Lee C-H, Hwang M-S, Yang W-P (1999) Enhanced privacy and authentication for the global system for mobile communications. Wireless Netw 5(4):231–243
Beller MJ, Chang L-F, Yacobi Y (1993) Privacy and authentication on a portable communication system. IEEE J Sel Areas Commun 11(6):821–829
Lo C-C, Chen Y-J (1999) Secure communication mechanisms for GSM networks. IEEE Trans Consum Electron 45(4):1074–1080
Lee T-F, Chang S-H, Hwang T, Chong SK (2009) Enhanced delegation-based authentication protocol for PCSs. IEEE Trans Wireless Commun 8(5):2166–2171
Youn T-Y, Lim J (2011) Improved delegation-based authentication protocol for secure roaming service with unlinkability. IEEE Commun Lett 14(9):791–793
Wang R-C, Juang W-S, Lei CL (2011) A privacy and delegation-enhanced user authentication protocol for portable communication systems. Int J Ad Hoc Ubiquitous Comput 6(3):183–190
Hwang S.-J, You C.-H (2011) Weakness of Wang et al.’s privacy and delegation enhanced user authentication protocol for PCSs,” CSCIST 2011 and iCube 2011, Taipei, 2011
Chen H.-B, Lai Y.-H, Chen K.-W, Lee W.-B (2011) Enhanced delegation based authentication protocol for secure roaming service with synchronization. J Electronic Sci Technol 9(4), pp 345–351
Hwang S-J, Sung Y-H (2011) Confidential deniable authentication using promised signcryption. J Syst Softw 84:1652–1659
Nguyen K (2005) Asymmetric concurrent signatures. In: Proceedings of information and communications security conference (ICICS 2005), LNCS 3783, Springer, New York, pp 181–193
Schnorr C (1991) Efficient signature generation by smart cards. J Cryptology 14(3), pp 161–174
Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptography 13(3), pp 361–396
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Hwang, SJ., You, CH. (2014). A Delegation-Based Unlinkable Authentication Protocol for Portable Communication Systems with Non-repudiation. In: Huang, YM., Chao, HC., Deng, DJ., Park, J. (eds) Advanced Technologies, Embedded and Multimedia for Human-centric Computing. Lecture Notes in Electrical Engineering, vol 260. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7262-5_105
Download citation
DOI: https://doi.org/10.1007/978-94-007-7262-5_105
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-7261-8
Online ISBN: 978-94-007-7262-5
eBook Packages: EngineeringEngineering (R0)