An efficient identity-based cryptosystem for end-to-end mobile security

被引:0
|
作者
Hwu, Jing-Shyang [1 ]
Chen, Rong-Jaye [1 ]
Lin, Yi-Bing [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30010, Taiwan
关键词
end-to-end security; identity-based cryptography; mobile banking; public key;
D O I
10.1109/TWC.2006.04839
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper proposes an efficient ID-based encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20-35%.
引用
收藏
页码:2586 / 2593
页数:8
相关论文
共 50 条
  • [1] Hierarchical Identity Based Cryptography for End-to-End Security in DTNs
    Patra, Rabin
    Surana, Sonesh
    Nedevschi, Sergiu
    2008 IEEE 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2008, : 223 - 230
  • [2] End-to-End Confidentiality for a Message Warehousing Service Using Identity-Based Encryption
    Karabulut, Yuecel
    Weppner, Harald
    Nassi, Ike
    Nagarajan, Anusha
    Shroff, Yash
    Dubey, Nishant
    Shields, Tyelisa
    2010 IEEE 26TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDE 2010), 2010, : 33 - 40
  • [3] DEVICE IDENTITY MANAGEMENT AND END-TO-END SECURITY
    Latour, Jacques
    D'Souza, Natasha
    IEEE NETWORK, 2021, 35 (05): : 8 - 9
  • [4] Security of an identity-based cryptosystem and the related reductions
    Okamoto, T
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 546 - 560
  • [5] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [6] Efficient end-to-end authentication protocols for mobile networks
    Chang, CH
    Tu, K
    Chen, KC
    PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1252 - 1256
  • [7] A Network Assisted End-to-End Security Protocol for Mobile Applications
    He, Lisha
    Zhang, Ning
    He, Lirong
    Rogers, Ian
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 159 - 165
  • [8] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications
    Dojen, Reiner
    Pasca, Vladimir
    Coffey, Tom
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287
  • [9] End-to-End Security in Delay Tolerant Mobile Social Network
    Rani, Rinki
    Katti, C. P.
    APPLICATIONS OF COMPUTING AND COMMUNICATION TECHNOLOGIES, ICACCT 2018, 2018, 899 : 45 - 54
  • [10] End-to-end encrypted communication security technology for mobile terminals
    Zhang, Xiaozhi
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 179 - 195