Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9506450 | Applied Mathematics and Computation | 2005 | 9 Pages |
Abstract
For enhancing the efficiency and the security in anonymous channel of wireless systems, many protocols were proposed. However, most of them employed asymmetric cryptosystems to protect the identity of the mobile user. As we know, the drawbacks of asymmetric cryptosystem are complex and high computation cost. Therefore, if the wireless system is based on asymmetric cryptosystem, that is not convenience for the mobile device and infrastructure. Not only that, an important problem also exists in the previous protocols. That is when the mobile user copies his anonymous ticket and shares it with friends, the visiting network cannot discriminate the copy of the ticket. That seriously effects the right of the visiting network. In this paper, we shall propose a secure and efficient authentication protocol to withstand the above weakness without employing any asymmetric cryptosystems.
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Chou-Chen Yang, Yuan-Liang Tang, Ren-Chiun Wang, Hung-Wen Yang,