Skip to Main Content
The paper presents a secure protocol for authentication in mobile-communications. We analyse some existing works with their weaknesses. In our protocol we use a simple blinding-binding technique for users secret keys generation such that the base-station authentication center never comes to know users secret keys. Our protocol not only overcomes the weakness of existing works but also avoids the need of certificate management, secure channel and satisfies necessary security properties of wireless communications.
Date of Conference: 11-13 July 2005