•  
  •  
 

Applied Mathematics & Information Sciences

Author Country (or Countries)

Taiwan

Abstract

An authentication protocol allows on-line service providers to validate the identity or legitimacy of a logging user. Once passing the verification, an authorized user can obtain useful and valuable resource or services from the service provider through Internet conveniently. However, most the current authentication protocols cannot protect user’s privacy perfectly. To improve this deficiency, we proposed a robust and efficient authentication protocol attempting to preserve user’s privacy entirely and also provide the following properties: i) user anonymity, ii) deniability, iii) key agreement, and iv) efficiency. Moreover, our proposed protocol is non-interactive, which is achieved by reducing the number of message exchanges between users and service provider upon performing the authentication activity. Hence, our proposed protocol is more suitable for current wireless mobile network environments due to only need message exchange once avoiding the channel error rate. Moreover, analysis showed that our proposed protocol can withstand various known kinds of attacks.

Suggested Reviewers

N/A

Share

COinS