We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Improved Authentication Protocol for Mobile Communication based on Tripartite Signcryption

by Hassan M. Elkamchouchi, Eman F. Abou Elkheir, Yasmine Abouelseoud
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 14
Year of Publication: 2014
Authors: Hassan M. Elkamchouchi, Eman F. Abou Elkheir, Yasmine Abouelseoud
10.5120/16076-5198

Hassan M. Elkamchouchi, Eman F. Abou Elkheir, Yasmine Abouelseoud . An Improved Authentication Protocol for Mobile Communication based on Tripartite Signcryption. International Journal of Computer Applications. 92, 14 ( April 2014), 13-18. DOI=10.5120/16076-5198

@article{ 10.5120/16076-5198,
author = { Hassan M. Elkamchouchi, Eman F. Abou Elkheir, Yasmine Abouelseoud },
title = { An Improved Authentication Protocol for Mobile Communication based on Tripartite Signcryption },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 14 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number14/16076-5198/ },
doi = { 10.5120/16076-5198 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:18.246609+05:30
%A Hassan M. Elkamchouchi
%A Eman F. Abou Elkheir
%A Yasmine Abouelseoud
%T An Improved Authentication Protocol for Mobile Communication based on Tripartite Signcryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 14
%P 13-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper introduces a new authentication protocol using the tripartite signcryption scheme without bilinear pairings that provides confidentiality and authentication between three entities. Mobile communication seems very attractive to users as well as operators and service providers. However, despite of its numerous advantages, mobile communication has been facing many security problems. In this paper, it is demonstrated how the proposed tripartite signcryption scheme can be used to provide authentication and to guarantee secure communication. The use of the proposed tripartite signcryption scheme helps reduce the signaling overhead compared to the scheme in [1].

References
  1. W. Khan and H. Ullah, "Authentication and Secure Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography", IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 2010 ,ISSN (Online): 1694-0784 ISSN (Print): 1694-0814
  2. Y. Li, Y. Chen, and T. MA, "Security in GSM", Retrieved March 18, 2008, from http://www. gsm-security. net/gsm-security-papers. shtml.
  3. N. T. Trask and M. V. Meyerstein, "Smart Cards in Electronic Commerce", A Springer Link journal on BT Technology, Vol. 17, No. 3, 2004, pp. 57-66.
  4. N. T. Trask and S. A. Jaweed, "Adapting Public Key Infrastructures to the Mobile Environment", A SpringerLink journal on BT Technology, Vol. 19, No. 3, 2004, pp. 76-80.
  5. M. Nabil, Y. Abouelseoud, G. Elkobrosy, and A. Abdelrazek , "New Authenticated Key Agreement Protocols", Proceeding of The International Multiconference of Engineers And Computer Scientists (IMECS 2013 ) Vol. 1, March 13-15, 2013 , Hong Kong.
  6. Y. Abouelseoud, "A Tripartite Signcryption Scheme with Applications to E-Commerce", International Journal of Computer Applications (0975 – 8887) Volume 76– No. 15, August 2013.
  7. C. D. Smith," Digital Signcryption ", A thesis presented to the University of Waterloo in ful?lment of the thesis requirement for the degree of Master of Mathematics in Combinatorics and Optimization, 2005.
  8. X. Boyen, " Multipurpose Identity-Based Sign cryption: a Swiss Army Knife for Identity-based Cryptography ", LNCS: Advances in Cryptology-Crypto2003, Berlin: Springer-Verlag Press, 2003, pp. 383-399.
  9. http://en. wikipedia. org/wiki/Authentication
  10. D. Johnson, A. Menezes, and S. Vanstone, " The elliptic curve digital signature algorithm (ECDSA) ",International Journal of Information Security 1 (1) (2001) 36–63.
  11. V. Hassler and P. Moore, "Security Fundamentals for E-Commerce", Artech House London Inc. , 2001, pp. 356-367.
  12. Y. Zheng, "Digital Signcryption or How to Achieve Cost (Signature and Encryption) Cost (Signature) + Cost (Encryption)", Advances in Cryptology, LNCS, Vol. 1294. Springer-Verlag, pp. 165–179, 1997.
  13. H. Elkamchouchi, E. Abou El-kheir, and Y. Abouelseoud, " An Efficient Tripartite Signcryption Scheme Without Bilinear Pairings", International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 1010, ISSN 2229-5518
Index Terms

Computer Science
Information Sciences

Keywords

Tripartite Signcryption Mobile Communication Mobile Security