To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.
%0 Journal Article
%1 citeulike:4304895
%A Jiang, N.
%A Wang, J.
%D 2008
%J The Journal of China Universities of Posts and Telecommunications
%K authentication
%N 4
%P 69--74
%R 10.1016/S1005-8885(08)60406-9
%T Anonymous authentication protocol for multi-services in wireless environments
%U http://dx.doi.org/10.1016/S1005-8885(08)60406-9
%V 15
%X To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.
@article{citeulike:4304895,
abstract = {To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.},
added-at = {2009-05-19T18:00:18.000+0200},
author = {Jiang, N. and Wang, J.},
biburl = {https://www.bibsonomy.org/bibtex/2e2b725499df87ffbfd7829b1cd6d3150/earthfare},
citeulike-article-id = {4304895},
description = {CiteULike: Everyone's library},
doi = {10.1016/S1005-8885(08)60406-9},
interhash = {ad6e0aec154675385ad33f73216bded9},
intrahash = {e2b725499df87ffbfd7829b1cd6d3150},
issn = {10058885},
journal = {The Journal of China Universities of Posts and Telecommunications},
keywords = {authentication},
month = {December},
number = 4,
pages = {69--74},
posted-at = {2009-05-19 15:56:41},
priority = {2},
timestamp = {2009-05-19T18:03:27.000+0200},
title = {Anonymous authentication protocol for multi-services in wireless environments},
url = {http://dx.doi.org/10.1016/S1005-8885(08)60406-9},
volume = 15,
year = 2008
}