Anonymous authentication protocols with credit-based chargeability and fair privacy for mobile communications

被引:0
作者
Fan, Chun-, I [1 ]
Huang, Vincent Shi-Ming [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
来源
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS | 2007年 / 4752卷
关键词
mutual authentication; anonymity; fair privacy; cryptography; mobile networks; ubiquitous computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart and tiny mobile phones are widely popularized and advanced mobile communication services are provided increasingly such that ubiquitous computing environments will come true soon. It is a pleasure for mobile users to work or get recreations in the mobile network environments. However, just as the cases in wireline networks, there are many security threats to mobile network systems and their impact on the security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property in mobile network systems. The secret personal information, important data, or classified documents which mobile users carry may be stolen by malicious entities. In order to guarantee the quality of the advanced communication services, the security and privacy would be important issues when mobile users roam to the mobile networks. In this paper, an anonymous authentication scheme will be proposed to protect both the security of the mobile network system and the privacy of mobile users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also the identity of each user can be kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still make correct bills to charge these anonymous users. Finally, our protocols also achieve the goal of fair privacy which allows the judge to be able to revoke the anonymity and trace the illegal users when they misused the anonymity property such as they committed crimes.
引用
收藏
页码:412 / +
页数:3
相关论文
共 29 条
  • [21] Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
    Manojkumar Vivekanandan
    Sastry V. N.
    Srinivasulu Reddy U.
    Peer-to-Peer Networking and Applications, 2021, 14 : 1572 - 1595
  • [22] Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment
    Feng, Qi
    He, Debiao
    Zeadally, Sherali
    Wang, Huaqun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 : 239 - 251
  • [23] LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
    Abdi Nasib Far, Hossein
    Bayat, Majid
    Kumar Das, Ashok
    Fotouhi, Mahdi
    Pournaghi, S. Morteza
    Doostari, M. A.
    WIRELESS NETWORKS, 2021, 27 (02) : 1389 - 1412
  • [24] Computationally efficient and secure anonymous authentication scheme for IoT-based mobile pay-TV systems
    Kumaravelu, Ramesh
    Sadaiyandi, Rajakumar
    Selvaraj, Anandamurugan
    Selvaraj, Jeeva
    Karthick, Gayathiri
    COMPUTATIONAL INTELLIGENCE, 2020, 36 (03) : 994 - 1009
  • [25] Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns
    Hu, Shunfang
    Zhang, Yuanyuan
    Guo, Yanru
    Chen, Yanru
    Chen, Liangyin
    SENSORS, 2025, 25 (03)
  • [26] Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography
    He, Debiao
    Zeadally, Sherali
    Wu, Libing
    Wang, Huaqun
    COMPUTER NETWORKS, 2017, 128 : 154 - 163
  • [27] MBPA: A Medibchain-Based Privacy-Preserving Mutual Authentication in TMIS for Mobile Medical Cloud Architecture
    Liu, Xiaoxue
    Ma, Wenping
    Cao, Hao
    IEEE ACCESS, 2019, 7 : 149282 - 149298
  • [28] Advance Artificial Intelligence Based Mutual Authentication Technique with Four Entities in 4-G Mobile Communications
    Bhattacharjee, Pijush Kanti
    Roy, Sudipta
    Pal, Rajat Kumar
    2014 INTERNATIONAL CONFERENCE ON SOFT COMPUTING & MACHINE INTELLIGENCE ISCMI 2014, 2014, : 139 - 145
  • [29] Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation移动无线网络中具有条件隐私保护功能的匿名切换认证协议
    Debiao He
    Ding Wang
    Qi Xie
    Kefei Chen
    Science China Information Sciences, 2017, 60