Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Authentication of Mobile Users in Third Generation Mobile Systems
Wireless Personal Communications: An International Journal
Software Implementation of Elliptic Curve Cryptography over Binary Fields
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
On parallelization of high-speed processors for elliptic curve cryptography
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A self-encryption mechanism for authentication of roaming and teleconference services
IEEE Transactions on Wireless Communications
A new delegation-based authentication protocol for use in portable communication systems
IEEE Transactions on Wireless Communications
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks
IEEE Transactions on Wireless Communications
Anonymous and Authenticated Key Exchange for Roaming Networks
IEEE Transactions on Wireless Communications
An Efficient Mobile Authentication Scheme for Wireless Networks
IEEE Transactions on Wireless Communications
The quest for personal control over mobile location privacy
IEEE Communications Magazine
Scalable and efficient mobile authentication scheme preserving user privacy
International Journal of Ad Hoc and Ubiquitous Computing
Analysis of mobile authentication protocols by SVO logic
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.01 |
Increasing numbers of mobile users are being allowed to use wireless networks, and universal access is being promoted. In the absent of a single, trusted authentication server, it is a great challenge to ensure the inter-domain security, which makes it feasible for users to migrate into foreign domains. Thus, an authentication mechanism is needed between mobile users and foreign servers, and an authenticated key also is highly desirable to support secure communications in wireless networks. In addition, maintaining the anonymity of users is an important security requirement, such as the information about customers's behaviors. Recent research has focused on these issues and has provided definitions and some constructions. Importantly, Tang and Wu proposed an efficient mobile authentication scheme, which they called "Efficient Mobilization Authentication Scheme" (EMAS), which enjoys both computational efficiency and communication efficiency that exceed the efficiencies of other recent mobile authentication schemes. Unfortunately, we found out that Tang and Wu's scheme does not meet the basic security requirements. Therefore, to develop a more acceptable mobile authentication scheme, we propose a self-verified mobile authentication scheme that has a novel architecture. To provide the better computation efficiency and storage efficiency, our scheme does not require of long-term secret keys on the servers.