{"title":"增强的UMTS认证与密钥协商协议的安全性研究","authors":"M. Hwang, Song-Kong Chong, Hsia-Hung Ou","doi":"10.1002/ett.1460","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a practical and secure authentication and key agreement (AKA) scheme for Universal Mobile Telecommunications System (UMTS). The paper introduces a new requirement, ‘home network should be partially trusted in an authentication scheme’ to the UMTS. The scheme integrates symmetric and public key cryptosystem. Issues such as kinds of ‘subscriber identity/location confidential’ and ‘non-repudiation services’ are solved in the scheme. The paper provides computational analysis, messages transmission length analysis to the proposed scheme. Furthermore, comparisons with other schemes are also given. The results demonstrate that the proposed scheme is practical and secure. Copyright © 2010 John Wiley & Sons, Ltd.","PeriodicalId":50473,"journal":{"name":"European Transactions on Telecommunications","volume":"36 1","pages":"99-112"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":"{\"title\":\"On the security of an enhanced UMTS authentication and key agreement protocol\",\"authors\":\"M. Hwang, Song-Kong Chong, Hsia-Hung Ou\",\"doi\":\"10.1002/ett.1460\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a practical and secure authentication and key agreement (AKA) scheme for Universal Mobile Telecommunications System (UMTS). The paper introduces a new requirement, ‘home network should be partially trusted in an authentication scheme’ to the UMTS. The scheme integrates symmetric and public key cryptosystem. Issues such as kinds of ‘subscriber identity/location confidential’ and ‘non-repudiation services’ are solved in the scheme. The paper provides computational analysis, messages transmission length analysis to the proposed scheme. Furthermore, comparisons with other schemes are also given. The results demonstrate that the proposed scheme is practical and secure. Copyright © 2010 John Wiley & Sons, Ltd.\",\"PeriodicalId\":50473,\"journal\":{\"name\":\"European Transactions on Telecommunications\",\"volume\":\"36 1\",\"pages\":\"99-112\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"26\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"European Transactions on Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/ett.1460\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Transactions on Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/ett.1460","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26