首页 | 本学科首页   官方微博 | 高级检索  
     


An efficient user identification scheme based on ID-based cryptosystem
Authors:Min-Shiang Hwang   Jung-Wen Lo  Shu-Chen Lin
Affiliation:

a Department of Management Information System, National Chung Hsing University, 250 Kuo Kuang Road, 402, Taichung 250, Taiwan, ROC

b Department of Information Management, National Taichung Institute of Technology, 129 Sec. 3, San-min Road, Taichung 404, Taiwan, ROC

c Department of Information Management, Chaoyang University of Technology, 168 Gifeng East Road, Wufeng, Taichung 413, Taiwan, ROC

Abstract:Tseng-Jan modified a non-interactive public key distribution system and also proposed several applications based on the Maurer–Yacobi scheme. In their scheme, a user can prove his identity to another user without revealing his secret key. They use a challenge-response-type interactive protocol to achieve their objective. However, in wireless environment, waiting for a corresponding response from the other is time-wasting and consumes the battery of the mobile device. The ability of computing and the capacity of the battery of a mobile device are limited. Therefore, we propose an efficient scheme based on ID-based cryptosystem that is more suitable to be applied in the mobile environment.
Keywords:Challenge-response protocol   Identity-based cryptosystem   User identification
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号