Skip to main content

Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications

  • Conference paper
Advances in Information and Computer Security (IWSEC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4752))

Included in the following conference series:

Abstract

Smart and tiny mobile phones are widely popularized and advanced mobile communication services are provided increasingly such that ubiquitous computing environments will come true soon. It is a pleasure for mobile users to work or get recreations in the mobile network environments. However, just as the cases in wireline networks, there are many security threats to mobile network systems and their impact on the security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property in mobile network systems. The secret personal information, important data, or classified documents which mobile users carry may be stolen by malicious entities. In order to guarantee the quality of the advanced communication services, the security and privacy would be important issues when mobile users roam to the mobile networks. In this paper, an anonymous authentication scheme will be proposed to protect both the security of the mobile network system and the privacy of mobile users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also the identity of each user can be kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still make correct bills to charge these anonymous users. Finally, our protocols also achieve the goal of fair privacy which allows the judge to be able to revoke the anonymity and trace the illegal users when they misused the anonymity property such as they committed crimes.

This research was partially supported by the National Science Council of the ROC (Taiwan) under grant NSC 95-2219-E-110-004.

This work was also supported in part by TWISC@NCKU under grant NSC 94-3114-P-006-001-Y.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Samfat, D., Molva, R., Asokan, N.: Untraceability in mobile networks. In: International Conference on Mobile Computing and Networking, pp. 26–36 (1995)

    Google Scholar 

  2. Hwang, K.F., Chang, C.C.: A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Transactions on Wireless Communications 2(2), 400–407 (2003)

    Article  MathSciNet  Google Scholar 

  3. Asokan, N.: Anonymity in a mobile computing environment. Mobile Computing System and Applications, 200–204 (December 1994)

    Google Scholar 

  4. Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-location privacy for networks of energy-constrained sensors. In: Proceedings of Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, pp. 68–72 (May 2004)

    Google Scholar 

  5. Karygiannis, A., Kiayias, A., Tsiounis, Y.: A solution for wireless privacy and payments based on e-cash. Security and Privacy for Emerging Areas in Communications Networks, 206–218 (September 2005)

    Google Scholar 

  6. He, Q., Wu, D., Khosla, P.: The quest for personal control over mobile location privacy. Communications Magazine, IEEE, 130–136 (May 2004)

    Google Scholar 

  7. Park, S.Y., Han, M.S., Eom, Y.I.: An efficient authentication protocol supporting privacy in mobile computing environments. In: 5th IEEE International Conference on High Speed Networks and Multimedia Communications, pp. 332–334 (July 2002)

    Google Scholar 

  8. Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics 50(1), 231–235 (2004)

    Article  MathSciNet  Google Scholar 

  9. Kesdogan, D., Fouletier, X.: Secure location information management in cellular radio systems. Wireless Communication System Symposium, IEEE, 35–40 (November 1995)

    Google Scholar 

  10. Lin, W.D., Jan, J.K.: A wireless-based authentication and anonymous channels for large scale area. In: Proceedings of Sixth IEEE Symposium on Computers and Communictions, pp. 36–41 (July 2001)

    Google Scholar 

  11. Schneier, B.: Applied cryptography second edition: protocols, algorithms, and source code in C. Professional, Reference and Trade Group  (1996)

    Google Scholar 

  12. Tracz, R., Wrona, K.: Fair electronic cash withdrawal and change return for wireless networks. In: International Workshop on Mobile Commerce, pp. 14–19 (2001)

    Google Scholar 

  13. Jakobsson, M., Yung, M.: Revokable and versatile electronic money. In: Conference on Computer and Communications Security, pp. 76–87 (1996)

    Google Scholar 

  14. Chaum, D.: Blind Signature Systems. In: Advances in Cryptology – CRYPTO 1983, p. 153. Plenum

    Google Scholar 

  15. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  16. Mu, Y., Varadharajan, V.: A new scheme of credit based payment for electronic commerce. In: 23rd Annual IEEE International Conference on Local Computer Networks, pp. 278–284 (October 1998)

    Google Scholar 

  17. Yang, C.-C., Tang, Y.-L., Wang, R.-C., Yang, H.-W.: A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation 169, 1431–1439 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  18. Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Atsuko Miyaji Hiroaki Kikuchi Kai Rannenberg

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fan, CI., Huang, V.SM. (2007). Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications . In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds) Advances in Information and Computer Security. IWSEC 2007. Lecture Notes in Computer Science, vol 4752. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75651-4_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75651-4_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75650-7

  • Online ISBN: 978-3-540-75651-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics