Universal one-way hash functions and their cryptographic applications
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Towards the Introduction of the Asymmetric Cryptography in GSM, GPRS, and UMTS Networks
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
On the security of wireless network access with enhancements
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Security model for Intra-Domain Mobility Management Protocol
International Journal of Mobile Communications
A new authentication protocol based on pointer forwarding for mobile communications
Wireless Communications & Mobile Computing - ISWCS'2006
Anonymous authentication for mobile Single Sign-On to protect user privacy
International Journal of Mobile Communications
International Journal of Mobile Communications
Robust and efficient authenticated key agreement in mobile communications
International Journal of Mobile Communications
An Improved Authentication Protocol with Less Delay for UMTS Mobile Networks
ICNDS '09 Proceedings of the 2009 International Conference on Networking and Digital Society - Volume 02
A cocktail protocol with the Authentication and Key Agreement on the UMTS
Journal of Systems and Software
The UMTS-AKA protocols for intelligent transportation systems
EURASIP Journal on Wireless Communications and Networking
A Provable Billing Protocol on the Current UMTS
Wireless Personal Communications: An International Journal
International Journal of Mobile Communications
An authentication protocol for low-cost RFID tags
International Journal of Mobile Communications
A secure routing protocol with node selfishness resistance in MANETs
International Journal of Mobile Communications
Security analysis and enhancements of 3GPP authentication and key agreement protocol
IEEE Transactions on Wireless Communications
Double Delegation-Based Authentication and Key Agreement Protocol for PCSs
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Universal Mobile Telecommunication System (UMTS) is the most popular third-generation mobile phone system at present and the UMTS AKA is authentication and key agreement protocol. There are some weaknesses in the existing UMTS AKA protocol, such as synchronisation question, storage overhead, insecurity with leakiness authentication vector and weakness in mutual authentications. In this paper, we use the concept of proxy key to design a more secure and more efficient UMTS AKA protocol. Our protocol can not only resist the above-mentioned drawback of the original UMTS AKA protocol on the security, but also improve the performance of UMTS AKA protocol, including the computational overhead, storage overhead and communication overhead.