A Novel User Identification Scheme Based on ID-Based Cryptosystem

被引:0
|
作者
Wang, Hong [1 ]
Wei, Shimin [1 ]
机构
[1] Huaibei Normal Univ, Inst Comp Sci & Technol, Huaibei, Anhui, Peoples R China
关键词
identity-based cryptosystem; user identification scheme; time-based; non-interactive public key distribution;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User identification schemes based on Maurer-Yacobi scheme, an ID-based cryptosystem, is suitable for application to the mobile environment. Recently, H. Park et al. proposed such a scheme secure against the Liu-Horng-Liu attack. However, their scheme is time-based. In this paper, we propose a novel user identification scheme which is not time based. Our scheme is secure and applicable to distributed systems.
引用
收藏
页码:555 / 556
页数:2
相关论文
共 50 条
  • [1] An efficient user identification scheme based on ID-based cryptosystem
    Hwang, MS
    Lo, JW
    Lin, SC
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (06) : 565 - 569
  • [2] Efficient and secure user identification scheme based on ID-based cryptosystem
    Kim, Kee-Won
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    INTERNATIONAL E-CONFERENCE ON COMPUTER SCIENCE 2005, 2005, 2 : 79 - 82
  • [3] Improvement of an efficient user identification scheme based on ID-based cryptosystem
    Yoon, EJ
    Yoo, KY
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 586 - 591
  • [4] An improvement of an efficient user identification scheme based on ID-based cryptosystem
    Chou, Jue-Sam
    Chen, Yalin
    Lin, Chu-Hsing
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 558 - +
  • [5] Cryptanalysis of an efficient user identification scheme based on ID-based cryptosystem
    Liu, CL
    Horng, G
    Liu, HY
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) : 2171 - 2172
  • [6] A secure id-based user identification scheme for wireless environments
    Hsu, Chien-Lung
    ICIC Express Letters, 2010, 4 (03): : 629 - 633
  • [7] Cryptanalysis of two identification schemes based on an ID-based cryptosystem
    Tang, Q
    Mitchell, CJ
    IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (05): : 723 - 724
  • [8] A Novel Dynamic ID-Based Remote User Authentication Scheme
    Misbahuddin, Md.
    Ahmed, Md. Aijaz
    Rao, A. Ananda
    Bindu, C. Shoba
    Khan, M. A. Muqsit
    2006 ANNUAL IEEE INDIA CONFERENCE, 2006, : 364 - +
  • [9] New ID-based identification scheme
    Li, Yan-Ping
    Su, Wan-Li
    Wang, Yu-Min
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2009, 30 (01): : 86 - 90
  • [10] ID-based digital signature scheme on the elliptic curve cryptosystem
    Chung, Yu Fang
    Huang, Kuo Hsuan
    Lai, Feipei
    Chen, Tzer Shyong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) : 601 - 604