Abstract
User authentication is an operation whereby one user is aware of the identity of an another user involved in a protocol. In 2004, Park presented an authentication protocol providing user anonymity based on the secret-key certificate and error-correcting codes called PA protocol. In this paper, it will be argued that PA protocol is vulnerable to the man-in-the-middle attack and does not provide a sufficient level of security. Then, an improved protocol to fix this problem is proposed.
This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Berlin (2003)
Wu, T.C.: Conference key distribution system with user anonymity based on algebraic approach. IEE Proceedings Computer Digital Technology 144(2), 145–148 (1997)
Tseng, Y.M., Jan, J.K.: Anonymous conference key distribution systems based on discrete logarithm problem. Computer Communications 22, 749–754 (1999)
Wilson, S.B., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)
Park, C.S.: Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems. Computer Networks 44, 267–273 (2004)
Shim, K.: Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols, http://eprint.iacr.org/2003/115.pdf
Shim, K.: Some Attacks on Chikazawa-Yamagishi ID-Based Key Sharing Scheme. IEEE Communications Letters 7(3), 145–147 (2003)
Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: WiSe 2004, Philadelphia, Pennsylvania, USA, October 2004, pp. 90–97 (2004)
Mitchell, C.J.: Remote User Authentication Using Public Information. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 360–369. Springer, Heidelberg (2003)
Berlekamp, E.R., McEliece, R.J., van Tilborg, H.C.A.: On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory 24(3), 384–386 (1978)
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory, DSN Progress Report, Jet Propulsion Lab., CA, January-February1978, pp. 42–44 (1978)
Park, C.S.: Improving code rate of McEliece public-key cryptosystem. Electronics Letters 25(21), 1466–1467 (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, WH., Yoon, EJ., Yoo, KY. (2005). New Authentication Protocol Providing User Anonymity in Open Network. In: Deng, X., Ye, Y. (eds) Internet and Network Economics. WINE 2005. Lecture Notes in Computer Science, vol 3828. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11600930_41
Download citation
DOI: https://doi.org/10.1007/11600930_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30900-0
Online ISBN: 978-3-540-32293-1
eBook Packages: Computer ScienceComputer Science (R0)