Abstract
The rapid growth of wireless systems provides us with mobility. In mobile environments, authentication of a user and confidentiality of his identity and location are two major security issues, which seem incompatible with each other. In this manuscript, we propose a user authentication scheme with identity and location privacy. This scheme is an interactive protocol based on public key cryptosystems. In the proposed scheme, to prove his authenticity, a user utilizes a digital signature scheme based on a problem with a random self-reducible relation such as the square root modulo a composite number problem and the discrete logarithm problem. We also define the security requirements for user authentication with identity and location privacy, impersonation-freeness and anonymity, against active attacks, and prove that the proposed scheme satisfies them assuming the security of the cryptographic schemes used in the scheme. Furthermore, we show that we can construct authenticated key agreement schemes by applying the proposed scheme to some existing authenticated key agreement schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cellular Digital Packet Data (CDPD) System Specification, release 1.0 edition, July 1993.
W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2):107–125, 1992.
DTI/EPSRC LINK Personal Communications Programme. Third Generation Mobile Telecommunications Systems Security Studies Technical Report 2: Security Mechanisms for Third Generation Systems, May 1996.
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31(4):469–472, 1985.
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO’86, pages 186–194, 1987. Lecture Notes in Computer Science 263.
A. Herzberg, H. Krawczyk, and G. Tsudik. On travelling Incognito. In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, 1994.
S. Hirose and S. Yoshida. An authenticated Diffie-Hellman key agreement protocol secure against active attacks. In PKC’98, pages 135–148, 1998. Lecture Notes in Computer Science 1431.
R. Molva, D. Samfat, and G. Tsudik. Authentication of mobile users. IEEE Network, 8(2):26–35, 1994.
R. Molva, G. Tsudik, E. V. Herreweghen, and S. Zatti. KryptoKnight: Authentication and key distribution system. In Proceedings on 1992 European Symposium on Research in Computer Security, pages 155–174, 1992.
D. Pointcheval and J. Stern. Security proofs for signature schemes. In EUROCRYPT’96, pages 387–398, 1996. Lecture Notes in Computer Science 1070.
M. Rahnema. Overview of the GSM system and protocol architecture. IEEE Communications Magazine, 31:92–100, 1993.
C. P. Schnorr. Efficient identification and signatures for smart cards. In CRYPTO’89, pages 239–252, 1990. Lecture Notes in Computer Science 435.
M. Tompa and H. Woll. Random self-reducibility and zero knowledge interactive proofs of possession of information. In 1987 IEEE Symposium on Foundations of Computer Science, pages 472–482, 1987.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hirose, S., Yoshida, S. (2001). A User Authentication Scheme with Identity and Location Privacy. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_20
Download citation
DOI: https://doi.org/10.1007/3-540-47719-5_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42300-3
Online ISBN: 978-3-540-47719-8
eBook Packages: Springer Book Archive