This Article 
 Bibliographic References 
 Add to: 
Anonymous Wireless Authentication on a Portable Cellular Mobile System
October 2004 (vol. 53 no. 10)
pp. 1317-1329
In this paper, a secure and anonymous conference call set-up scheme is proposed for a portable cellular mobile system. The proposed scheme uses an identity-based concept and enables a mobile unit and a base station to directly authenticate each other by their public identity. It provides mobile subscribers with user identification privacy. Each mobile unit joining in this system can determine whether it is part of a conference call, but it cannot derive any further information about who else is also in the conference. That is to say, an anonymous property, accomplished through the aspect of the knapsack-like cipher mechanism, is achieved among the communicating mobiles. Furthermore, reauthentication in the course of hand-off is also discussed and the reauthentication procedure is performed through a privacy homomorphism mechanism. The time computation with an 8-bit microcontroller handset is acceptable for performing an anonymous conference call in such mobile systems. Therefore, our scheme is feasible and able to be implemented in the existing wireless exploration environment.

[1] T. Haug, Overview of GSM: Philosophy and Results Int'l J. Wireless Information Networks, vol. 1, pp. 7-16, 1994.
[2] T1P1.3/93-044RI, Draft Technical Report on Privacy and Authentication Objectives for Wireless Access to Personal Communications pp. 9-11, May 1993.
[3] M. Tatebayashi, N. Matsuzaki, and D.B. Newman, Key Distribution Protocol for Digital Mobile Communication Systems Advances in Cryptology: Proc. of Crypto '89, pp. 324-333, 1990.
[4] T. Hwang, Scheme for Secure Digital Communication Based on Symmetric Key Cryptography Information Processing Letters, vol. 48, pp. 35-37, 1993.
[5] G. Coomaraswamy and S.P.R. Kumar, A Novel Method for Key Exchange and Authentication with Cellular Network Applications Proc. IEEE Conf. Universal Personal Comm. (ICUPC '93), pp. 186-190, 1993.
[6] M.J. Beller, L.F. Chang, and Y. Yacobi, Privacy and Authentication on a Portable Communications System IEEE J. Selected Areas. in Comm., vol. 11, pp. 821-829, Aug. 1993.
[7] A. Ashar and W. Diffie, Privacy and Authentication for Wireless Local Area Networks IEEE Personal Comm., pp. 25-31, First Quarter 1994.
[8] H.Y. Lin and L. Harn, Authentication in Wireless Communications Proc. IEEE Global Com '93, pp. 550-554, 1993.
[9] R. Molva, D. Samfat, and G. Tsudik, Authentication of Mobile Users IEEE Network, pp. 26-34, Mar./Apr. 1994.
[10] M.S. Hwang and W.P. Yang, Conference Key Distribution Protocols for Digital Mobile Communication Systems IEEE J. Selected Areas in Comm., vol. 13, no. 2, pp. 416-420, 1995.
[11] S. Hirose and K. Ikeda, A Conference Distribution System for the Start Configuration Based on the Discrete Logarithm Problem Information Processing Letters, vol. 62, no. 4, pp. 189-192, 1997.
[12] M.S. Hwang, Dynamic Participation in a Secure Conference Scheme for Mobile Communications IEEE Trans. Vehicular Technology, vol. 48, no. 5, pp. 1469-1474, Sept. 1999.
[13] C. Park, K. Itoh, and K. Kurosawa, Efficient Anonymous Channel and All/Nothing Election Scheme Advances in Cryptology: Proc. EuroCrypto '93, pp. 248-259, 1993.
[14] K. Sako and J. Kilian, Receipt-Free Mix-Type Voting Scheme Advances in Cryptology: Proc. EuroCrypt '95, pp. 393-403, 1995.
[15] R. Cramer, R. Gennaro, and B. Schoenmakers, A Secure and Optimally Efficient Multi-Authority Election Scheme Advances in Cryptology: Proc. EuroCrypt '97, pp. 103-118, 1997.
[16] A. Shamir, Identity-Based Cryptosystems and Signature Schemes Advances in Cryptology: Proc. Crypto '84, pp. 47-53, 1985.
[17] E. Okamota and K. Tanaka, Key Distribution System Based on Identification Information IEEE J. Select. Areas in Comm., vol. 7, no. 4, pp. 481-485, 1989.
[18] S. Tsujii and T. ltoh, An ID-Based Cryptosystem Based on the Discrete Logarithm Problem IEEE J. Selected Areas in Comm., vol. 7, no. 4, pp. 467-473, 1989.
[19] C.G. Gunther, An Identity-Based Key-Exchange Protocol Advances in Cryptology: Proc. Eurocrypt 1989, pp. 29-37, 1989.
[20] D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing Advances in Cryptology: Proc. Crypto 2001, pp. 213-229, 2001.
[21] L. Chen, K. Harrison, A. Moss, D. Soldera, and N.P. Smart, Certification of Public Keys within an Identity Based System Proc. Fifth Int'l Information Security Conf. (ISC 2002), pp. 322-333, 2002.
[22] W. Diffie and M.E. Hellman, New Directions in Cryptography IEEE Trans. Information Theory, vol. 22, pp. 644-654, 1976.
[23] R.L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
[24] A.S. Tanenbaum, Computer Networks, second ed. Englewood, N.J.: Prentice Hall, 1988.
[25] R.L. Rivest, L. Adleman, and M.L. Dertouzos, On Data Banks and Privacy Homomorphisms Foundations of Secure Computation, R.A. DeMillo et al., eds., pp. 169-179, New York: Academic Press, 1978.
[26] E.F. Brickell, P.J. Lee, and Y. Yacobi, Secure Audio Teleconference Advances in Cryptology: Proc. Crypto '87, pp. 117-125, 1988.
[27] D.E. Denning, Cryptography and Data Security. Addison-Wesley, 1983.
[28] R.C. Merkle and M.E. Hellman, Hiding Information and Signatures in Trapdoor Knapsack IEEE Trans. Information Theory, vol. 24, no. 5, pp. 525-530, Sept. 1978.
[29] L.S. Bobrow and M.A. Arbib, Discrete Mathematics: Applied Algebra for Computer and Information Science. Philadelphia: Saunders, 1974.
[30] C.P. Pfleeger, Security in Computing. Englewood Cliffs, N.J.: Prentice Hall, 1989.
[31] A. Lysyanskaya, R.L. Rivest, A. Sahai, and S. Wolf, Pseudonym Systems Proc. Selected Areas in Cryptography '99 (SAC '99), pp. 184-199, 1999.
[32] A. Shamir, A Polynomial-Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem IEEE Trans. Information Theory, vol. 30, no. 5, pp. 699-704, Sept. 1984.
[33] B. Schneier, Applied Cryptography, second ed. New York: John Wiley&Sons, 1996.
[34] J.C. Lagarias, Knapsack Public Key Cryptosystems and Diophantine Approximation Advances in Cryptology: Proc. Crypto '83, pp. 3-23, 1984.
[35] A. Shamir, How to Share a Secret Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
[36] T. Weigold, Java-Based Wireless Identity Module Proc. London Comm. Symp. 2002 (LCS 2002), 2002.
[37] D.E. Knuth, The Art of Computer Programming, vol. 2, second ed. Reading, Mass.: Addison-Wesley, 1981.

Index Terms:
Authentication, anonymity, group communications, identity-based cryptosystem, security.
Shiuh-Jeng Wang, "Anonymous Wireless Authentication on a Portable Cellular Mobile System," IEEE Transactions on Computers, vol. 53, no. 10, pp. 1317-1329, Oct. 2004, doi:10.1109/TC.2004.70
Usage of this product signifies your acceptance of the Terms of Use.