Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks
- 18 August 2009
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Vehicular Technology
- Vol. 58 (7), 3508-3517
- https://doi.org/10.1109/tvt.2009.2012389
Abstract
Based on identity-based cryptography, this paper proposes a remote authentication protocol featured with client anonymity, nonrepudiation, and improved efficiency for value-added services in a mobile environment. First, an identity-based signature scheme is proposed, and the verification result of the signature is a constant with respect to the signer's identifier. Then, a remote authentication protocol is constructed by combining the proposed signature scheme with a new concept called the client account index, which helps to realize client anonymity with no encryption operations. A formal proof and a theoretical analysis are provided to show the security strength of the proposals. Performance evaluation shows that compared with previous identity-based remote authentication schemes, the new protocol reduces at least 21.7% of the overall running time with stronger security; the reductions in the overall running time and signaling traffic reach 31.9% and 82.0%, respectively, compared with previous Rivest-Shamir-Adleman-based schemes.Keywords
This publication has 14 references indexed in Scilit:
- On Broadcast Authentication in Wireless Sensor NetworksIEEE Transactions on Wireless Communications, 2007
- A secure and efficient scheme of remote user authentication based on bilinear pairingsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Securing Mobile Ad Hoc Networks with Certificateless Public KeysIEEE Transactions on Dependable and Secure Computing, 2006
- A Remote User Authentication Scheme Using Bilinear Pairings and ECCPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- MASK: anonymous on-demand routing in mobile ad hoc networksIEEE Transactions on Wireless Communications, 2006
- A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing EnvironmentsIEEE Transactions on Vehicular Technology, 2006
- Identity-Based Key Agreement with Unilateral Identity Privacy Using PairingsLecture Notes in Computer Science, 2006
- Anonymous wireless authentication on a portable cellular mobile systemIEEE Transactions on Computers, 2004
- Security Arguments for Digital Signatures and Blind SignaturesJournal of Cryptology, 2000
- Key agreement protocols and their security analysisLecture Notes in Computer Science, 1997