摘要:The techniques of delegation-based authentication allow communication entities to authenticate each other and at the same time to support non-repudiation without imposing the public key infrasstrure requirement. This paper firstly points out some limiations of the delegation-based authentication protocol by Tsai et. al (TLW), and then introduces an improved delegation-based authentication protocol solving the problems. The protocol achieves all required security properties including resistance to impersonation attacks, mutual authentication, unlinkability, and forward secrecy. Furthermore, compared to the TLW protocol, it not only provides better security, but also is more efficient in communication cost.