Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Privacy-Preserving Universal Authentication Protocol using Hierarchical Key and Group Signature

Print
PDF
IJCA Proceedings on National Conference on Advance Trends in Information Technology
© 2013 by IJCA Journal
NCATIT - Number 1
Year of Publication: 2013
Authors:
S. Ravikumar
A. Marimuthu

S Ravikumar and A Marimuthu. Article: Privacy-Preserving Universal Authentication Protocol using Hierarchical Key and Group Signature. IJCA Proceedings on National Conference on Advance Trends in Information Technology NCATIT:20-24, April 2013. Full text available. BibTeX

@article{key:article,
	author = {S. Ravikumar and A. Marimuthu},
	title = {Article: Privacy-Preserving Universal Authentication Protocol using Hierarchical Key and Group Signature},
	journal = {IJCA Proceedings on National Conference on Advance Trends in Information Technology},
	year = {2013},
	volume = {NCATIT},
	pages = {20-24},
	month = {April},
	note = {Full text available}
}

Abstract

A novel protocol to achieve privacy-preserving universal authentication protocol for wireless communications called Priauth. Verifier-Local Revocation Group Signature with Backward Unlinkability (VLR-GS-BU), it can satisfy all requirements. Priauth belongs to the class of Universal Authentication Protocols in which same protocol and signaling flows are used regardless of the domain (home or foreign) a roaming user is visiting. Allowing people to get connected seamlessly using their devices without being limited by the geographical coverage of their own home networks roaming service should be deployed. The key is used to encrypt data transmitted to the servers or users. The efficient distribution of the new key for multiple membership changes is a critical problem in secure group communication. The goal of the enhancement is to evaluate trade-off between storage and revocation cost. Storage is computed in terms of keys that each user (respectively, VA) maintains and revocation cost is computed in terms of the encryptions performed, and the number of messages transmitted by the VA.

References

  • D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu, "A strong user authentication scheme with smart cards for wireless communications," Computer Commun. , 2010, doi:10. 1016/j. comcom. 2010. 02. 031.
  • G. Yang, Q. Huang, D. S. Wong, and X. Deng, "Universal authentication protocols for anonymous wireless communications," IEEE Trans. Wireless Commun. , vol. 9, no. 1, pp. 168-174, 2010.
  • G. Yang, D. S. Wong, and X. Deng, "Anonymous and authenticated key exchange for roaming networks," IEEE Trans. Wireless Commun. , vol. 6, no. 9, pp. 3461-3472, 2007.
  • G. Yang, D. Wong, and X. Deng, "Deposit-case attack against secure roaming," in Proc. ACISP'05, 2005.
  • D. He and S. Chan, "Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks," Wireless Personal Commun. , 2010, doi: 10. 1007/s11277-010- 0033-5M. Zhang and Y. Fang, "Security analysis and enhancements of 3GPP authentication and key agreement protocol," IEEE Trans. Wireless Commun. , vol. 4, no. 2, pp. 734-742, 2005.
  • C. C. Lee, M. S. Hwang, and I. E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments," IEEE Trans. Consumer Electron. , vol. 53, no. 5, pp. 1683-1687, 2006.
  • C. C. Wu, W. B. Lee, and W. J. Tsaur, "A secure authentication scheme with anonymity for wireless communications," IEEE Commun. Lett. vol. 12, no. 10, pp. 722-723, 2008.
  • J. -L. Tsai, "Efficient multi-server authentication scheme based on one way hash function without verification table," Computers & Security, vol. 27, no. 3-4, pp. 115-121, 2008.
  • A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. CRC Press LLC, 1997.
  • H. -C. Hsiang and W. -K. Shih, "Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment," Computer Standards & Interfaces, vol. 31, no. 6, pp. 1118-1123, 2009.
  • D. Boneh and H. Shacham, "Group signatures with verifier-local revocation," in Proc. ACM CCS'04, pp. 168-177, 2004.