2015
DOI: 10.1002/sec.1209
|View full text |Cite
|
Sign up to set email alerts
|

A privacy preserving authentication scheme for roaming services in global mobility networks

Abstract: To provide secure roaming services for mobile users in Global Mobility Networks, many schemes have been proposed in recent years. However, most of them focus only on authentication and fail to satisfy many practical security requirements such as user anonymity and untraceability. To address this problem, we propose a privacy-preserving authentication scheme based on elliptic curve cryptography. The proposed scheme is provably secure under a formal model that satisfies all practical security requirements. Compa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 21 publications
(28 citation statements)
references
References 20 publications
(38 reference statements)
0
28
0
Order By: Relevance
“…Here, we use the time as in : R e p function costs as much time as the scalar multiplication in the group G . For the time cost of FA, our scheme is better than , which also has ECC on the side of FA. But our scheme takes less time than for time cost of HA. For the communication cost, our scheme is only better than .…”
Section: Performance Evaluationmentioning
confidence: 95%
See 4 more Smart Citations
“…Here, we use the time as in : R e p function costs as much time as the scalar multiplication in the group G . For the time cost of FA, our scheme is better than , which also has ECC on the side of FA. But our scheme takes less time than for time cost of HA. For the communication cost, our scheme is only better than .…”
Section: Performance Evaluationmentioning
confidence: 95%
“…In Section 1, we have mentioned that schemes in cannot resist this attack. That is to say, if scriptA eavesdrops the messages of one session, then retrieves data from MU's smart card, and guesses ( I D ∗ , P W ∗ ), he can find the correct pair.…”
Section: Informal Security Characters Analysismentioning
confidence: 99%
See 3 more Smart Citations