An efficient identity-based cryptosystem for end-to-end mobile security

被引:0
|
作者
Hwu, Jing-Shyang [1 ]
Chen, Rong-Jaye [1 ]
Lin, Yi-Bing [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30010, Taiwan
关键词
end-to-end security; identity-based cryptography; mobile banking; public key;
D O I
10.1109/TWC.2006.04839
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper proposes an efficient ID-based encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20-35%.
引用
收藏
页码:2586 / 2593
页数:8
相关论文
共 50 条
  • [31] End-to-End Security for Personal Telehealth
    Koster, Paul
    Asim, Muhammad
    Petkovic, Milan
    USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 621 - 625
  • [32] End-to-End Security for Enterprise Mashups
    Rosenberg, Florian
    Khalaf, Rania
    Duftler, Matthew
    Curbera, Francisco
    Austel, Paula
    SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 389 - +
  • [33] End-to-end security for GSM users
    Rekha, AB
    Umadevi, B
    Solanke, Y
    Kolli, SR
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 434 - 437
  • [34] A REALIZATION SCHEME FOR THE IDENTITY-BASED CRYPTOSYSTEM
    TANAKA, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 340 - 349
  • [35] End-to-End License Plate Recognition System with Optimized Inference on Mobile Security Robots
    Ismail, Amir
    Mehri, Maroua
    Sahbani, Anis
    Ben Amara, Najoua Essoukri
    ROBOTICS AND MECHATRONICS, ISRM 2024, 2024, 158 : 383 - 393
  • [36] FRAMESEC: a FRAMEwork for the application development with end-to-end SECurity provision in the mobile computing environment
    Fiiho, B
    Viana, W
    Braga, R
    Andrade, R
    Telecommunications 2005, Proceedings, 2005, : 72 - 77
  • [37] An authorized equality test on identity-based cryptosystem for mobile social networking applications
    Hassan, Abdelrhman
    Elhabob, Rashad
    Eltayieb, Nabeil
    Wang, Yong
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (12)
  • [38] End-to-End Privacy for Identity & Location with IP
    Bhatti, Saleem N.
    Haywood, Gregor
    Yanagida, Ryo
    2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021), 2021,
  • [39] Efficient and Robust LiDAR-Based End-to-End Navigation
    Liu, Zhijian
    Amini, Alexander
    Zhu, Sibo
    Karaman, Sertac
    Han, Song
    Rus, Daniela L.
    2021 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA 2021), 2021, : 13247 - 13254
  • [40] An efficient end-to-end feature based system for SAR ATR
    Pham, QH
    Brosnan, TM
    Smith, MJT
    Mersereau, RM
    ALGORITHMS FOR SYNTHETIC APERTURE RADAR IMAGERY V, 1998, 3370 : 519 - 529