Skip to main content

New Authentication Protocol Providing User Anonymity in Open Network

  • Conference paper
  • 1925 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3828))

Abstract

User authentication is an operation whereby one user is aware of the identity of an another user involved in a protocol. In 2004, Park presented an authentication protocol providing user anonymity based on the secret-key certificate and error-correcting codes called PA protocol. In this paper, it will be argued that PA protocol is vulnerable to the man-in-the-middle attack and does not provide a sufficient level of security. Then, an improved protocol to fix this problem is proposed.

This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Berlin (2003)

    Google Scholar 

  2. Wu, T.C.: Conference key distribution system with user anonymity based on algebraic approach. IEE Proceedings Computer Digital Technology 144(2), 145–148 (1997)

    Article  Google Scholar 

  3. Tseng, Y.M., Jan, J.K.: Anonymous conference key distribution systems based on discrete logarithm problem. Computer Communications 22, 749–754 (1999)

    Article  Google Scholar 

  4. Wilson, S.B., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  5. Park, C.S.: Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems. Computer Networks 44, 267–273 (2004)

    Article  MATH  Google Scholar 

  6. Shim, K.: Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols, http://eprint.iacr.org/2003/115.pdf

  7. Shim, K.: Some Attacks on Chikazawa-Yamagishi ID-Based Key Sharing Scheme. IEEE Communications Letters 7(3), 145–147 (2003)

    Article  Google Scholar 

  8. Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: WiSe 2004, Philadelphia, Pennsylvania, USA, October 2004, pp. 90–97 (2004)

    Google Scholar 

  9. Mitchell, C.J.: Remote User Authentication Using Public Information. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 360–369. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory 24(3), 384–386 (1978)

    Article  MATH  Google Scholar 

  11. McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory, DSN Progress Report, Jet Propulsion Lab., CA, January-February1978, pp. 42–44 (1978)

    Google Scholar 

  12. Park, C.S.: Improving code rate of McEliece public-key cryptosystem. Electronics Letters 25(21), 1466–1467 (1989)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, WH., Yoon, EJ., Yoo, KY. (2005). New Authentication Protocol Providing User Anonymity in Open Network. In: Deng, X., Ye, Y. (eds) Internet and Network Economics. WINE 2005. Lecture Notes in Computer Science, vol 3828. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11600930_41

Download citation

  • DOI: https://doi.org/10.1007/11600930_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30900-0

  • Online ISBN: 978-3-540-32293-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics