A Novel User Identification Scheme Based on ID-Based Cryptosystem

被引:0
|
作者
Wang, Hong [1 ]
Wei, Shimin [1 ]
机构
[1] Huaibei Normal Univ, Inst Comp Sci & Technol, Huaibei, Anhui, Peoples R China
关键词
identity-based cryptosystem; user identification scheme; time-based; non-interactive public key distribution;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User identification schemes based on Maurer-Yacobi scheme, an ID-based cryptosystem, is suitable for application to the mobile environment. Recently, H. Park et al. proposed such a scheme secure against the Liu-Horng-Liu attack. However, their scheme is time-based. In this paper, we propose a novel user identification scheme which is not time based. Our scheme is secure and applicable to distributed systems.
引用
收藏
页码:555 / 556
页数:2
相关论文
共 50 条
  • [41] MODIFIED ID-BASED CRYPTOSYSTEM USING DISCRETE LOGARITHM PROBLEM
    LAIH, CS
    LEE, JY
    ELECTRONICS LETTERS, 1988, 24 (14) : 858 - 859
  • [42] A SECURE AND EFFICIENCY ID-BASED AUTHENTICATED KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM FOR MOBILE DEVICES
    Yoon, Eun-Jun
    Choi, Sung-Bae
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (04): : 2637 - 2653
  • [43] An improved dynamic ID-based remote user authentication with key agreement scheme
    Wen, Fengtong
    Li, Xuelei
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) : 381 - 387
  • [44] Improved security enhancement for a dynamic ID-based remote user authentication scheme
    School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    Beijing Hangkong Hangtian Daxue Xuebao, 2007, 5 (565-567+621):
  • [45] A more efficient and secure dynamic ID-based remote user authentication scheme
    Wang, Yan-yan
    Liu, Jia-yong
    Xiao, Feng-xia
    Dan, Jing
    COMPUTER COMMUNICATIONS, 2009, 32 (04) : 583 - 585
  • [46] An Improvement of Dynamic ID-Based Remote User Authentication Scheme with Smart Cards
    Gao, Zhengxian
    Tu, Yaqing
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 4562 - 4567
  • [47] Two-Factor Dynamic ID-Based Remote User Authentication Scheme
    Huang, Renjun
    Su, Fengfu
    Chen, Yangyi
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 373 - 377
  • [48] Security enhancement in ad hoc network with ID-based cryptosystem
    Song, J
    Kim, H
    Lee, S
    Yoon, H
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 372 - 376
  • [49] Cryptanalysis of a dynamic ID-based remote user authentication?with key agreement scheme
    Tang, Hong-bin
    Liu, Xin-song
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (12) : 1639 - 1644
  • [50] A practical approach of ID-based cryptosystem in ad hoc networks
    Kim, Heeyoul
    Song, Jumin
    Yoon, Hyunsoo
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2007, 7 (07): : 909 - 917