Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
Password authentication with insecure communication
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The GSM System for Mobile Communications
The GSM System for Mobile Communications
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Group signatures with verifier-local revocation
Proceedings of the 11th ACM conference on Computer and communications security
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
Theoretical Computer Science
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Deposit-case attack against secure roaming
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
Anonymous and Authenticated Key Exchange for Roaming Networks
IEEE Transactions on Wireless Communications
SLAB: A secure localized authentication and billing scheme for wireless mesh networks
IEEE Transactions on Wireless Communications
An efficient anonymous authentication protocol for mobile pay-TV
Journal of Network and Computer Applications
Verifier-local revocation group signatures with time-bound keys
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Analysis of mobile authentication protocols by SVO logic
Proceedings of the First International Conference on Security of Internet of Things
SA3: Self-adaptive anonymous authentication for dynamic authentication policies
Future Generation Computer Systems
Hi-index | 0.01 |
A secure roaming protocol allows a roaming user U to visit a foreign server V and establish a session key in an authenticated way such that U authenticates V and at the same time convinces V that it is a legitimate subscriber of some server H, called the home server of U. The conventional approach requires the involvement of all the three parties. In this paper, we propose a new approach which requires only two parties, U and V, to get involved. We propose two protocols: one provides better efficiency and supports user anonymity to an extent comparable to that provided by current mobile systems; and the other one achieves Strong User Anonymity that protects U's identity against both eavesdroppers and foreign servers and is currently the strongest notion of user anonymity defined for secure roaming. Both protocols are universal in the sense that the same protocol and signaling flows are used regardless of the domain (home or foreign) that U is visiting. This helps reducing the system complexity in practice. We also propose a practical user revocation mechanism, which is one of the most challenging problems for two-party roaming supporting Strong User Anonymity. Our solutions can be applied in various kinds of roaming networks such as Cellular Networks and interconnected Wireless Local Area Networks.