Authentication of mobile users in third generation mobile systems

Zhi Jia Tzeng, Wen-Guey Tzeng

Research output: Contribution to journalArticlepeer-review

25 Scopus citations


The goal of the third-generation mobile systems is to provide worldwide operation, enhance service capabilities, and improve performance over the second-generation mobile systems. In this paper, we propose an authentication procedure for third-generation mobile systems. The authentication procedure is a protocol suite consisting of two subprotocols: a certificate-based authentication (CBA) protocol and a ticket-based authentication (TBA) protocol. Only two parties, MS and VLR, are involved in executing our protocol. Our authentication procedure uses both public- and secret-key cryptosystems. Our authentication procedure not only provides uniform authentication across domains, but also reduces computational costs in the process of repeated authentication. We provide firm proof of our procedure's correctness.

Original languageEnglish
Pages (from-to)35-50
Number of pages16
JournalWireless Personal Communications
Issue number1
StatePublished - 1 Jan 2001


  • IMT-2000
  • third-generation mobile systems
  • GSM
  • authentication protocol
  • mobile computing

Fingerprint Dive into the research topics of 'Authentication of mobile users in third generation mobile systems'. Together they form a unique fingerprint.

Cite this