Skip to main content

A User Authentication Scheme with Identity and Location Privacy

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2119))

Abstract

The rapid growth of wireless systems provides us with mobility. In mobile environments, authentication of a user and confidentiality of his identity and location are two major security issues, which seem incompatible with each other. In this manuscript, we propose a user authentication scheme with identity and location privacy. This scheme is an interactive protocol based on public key cryptosystems. In the proposed scheme, to prove his authenticity, a user utilizes a digital signature scheme based on a problem with a random self-reducible relation such as the square root modulo a composite number problem and the discrete logarithm problem. We also define the security requirements for user authentication with identity and location privacy, impersonation-freeness and anonymity, against active attacks, and prove that the proposed scheme satisfies them assuming the security of the cryptographic schemes used in the scheme. Furthermore, we show that we can construct authenticated key agreement schemes by applying the proposed scheme to some existing authenticated key agreement schemes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cellular Digital Packet Data (CDPD) System Specification, release 1.0 edition, July 1993.

    Google Scholar 

  2. W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2(2):107–125, 1992.

    Article  MathSciNet  Google Scholar 

  3. DTI/EPSRC LINK Personal Communications Programme. Third Generation Mobile Telecommunications Systems Security Studies Technical Report 2: Security Mechanisms for Third Generation Systems, May 1996.

    Google Scholar 

  4. T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31(4):469–472, 1985.

    Article  MathSciNet  Google Scholar 

  5. A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO’86, pages 186–194, 1987. Lecture Notes in Computer Science 263.

    Google Scholar 

  6. A. Herzberg, H. Krawczyk, and G. Tsudik. On travelling Incognito. In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, 1994.

    Google Scholar 

  7. S. Hirose and S. Yoshida. An authenticated Diffie-Hellman key agreement protocol secure against active attacks. In PKC’98, pages 135–148, 1998. Lecture Notes in Computer Science 1431.

    Google Scholar 

  8. R. Molva, D. Samfat, and G. Tsudik. Authentication of mobile users. IEEE Network, 8(2):26–35, 1994.

    Article  Google Scholar 

  9. R. Molva, G. Tsudik, E. V. Herreweghen, and S. Zatti. KryptoKnight: Authentication and key distribution system. In Proceedings on 1992 European Symposium on Research in Computer Security, pages 155–174, 1992.

    Google Scholar 

  10. D. Pointcheval and J. Stern. Security proofs for signature schemes. In EUROCRYPT’96, pages 387–398, 1996. Lecture Notes in Computer Science 1070.

    Google Scholar 

  11. M. Rahnema. Overview of the GSM system and protocol architecture. IEEE Communications Magazine, 31:92–100, 1993.

    Article  Google Scholar 

  12. C. P. Schnorr. Efficient identification and signatures for smart cards. In CRYPTO’89, pages 239–252, 1990. Lecture Notes in Computer Science 435.

    Google Scholar 

  13. M. Tompa and H. Woll. Random self-reducibility and zero knowledge interactive proofs of possession of information. In 1987 IEEE Symposium on Foundations of Computer Science, pages 472–482, 1987.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hirose, S., Yoshida, S. (2001). A User Authentication Scheme with Identity and Location Privacy. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_20

Download citation

  • DOI: https://doi.org/10.1007/3-540-47719-5_20

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42300-3

  • Online ISBN: 978-3-540-47719-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics