An efficient identity-based cryptosystem for end-to-end mobile security

被引:0
|
作者
Hwu, Jing-Shyang [1 ]
Chen, Rong-Jaye [1 ]
Lin, Yi-Bing [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30010, Taiwan
关键词
end-to-end security; identity-based cryptography; mobile banking; public key;
D O I
10.1109/TWC.2006.04839
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper proposes an efficient ID-based encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20-35%.
引用
收藏
页码:2586 / 2593
页数:8
相关论文
共 50 条
  • [41] Fast overlay tree based on efficient end-to-end measurements
    Jin, X
    Wang, YJ
    Chan, SHG
    ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 1319 - 1323
  • [42] TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE
    Hossain, M. Shamim
    Muhammad, Ghulam
    Rahman, Sk Md Mizanur
    Abdul, Wadood
    Alelaiwi, Abdulhameed
    Alamri, Atif
    IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 44 - 51
  • [43] Sizzle: A standards based end-to-end security architecture for the embedded Internet
    Gupta, V
    Millard, M
    Fung, S
    Zhu, Y
    Gura, N
    Eberle, H
    Shantz, SC
    Third IEEE International Conference on Pervasive Computing and Communications, Proceedings, 2005, : 247 - 256
  • [44] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [45] Standards-based End-to-End IP Security for the Internet of Things
    Hummen, Rene
    Wehrle, Klaus
    2013 21ST IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2013,
  • [46] END-TO-END ENERGY EFFICIENT COMMUNICATION
    Dittmann, Lars
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND APPLICATION, ICCTA2011, 2011, : 323 - 327
  • [47] On the Security of End-to-End Measurements Based on Packet-Pair Dispersions
    Karame, Ghassan O.
    Danev, Boris
    Bannwart, Cyrill
    Capkun, Srdjan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) : 149 - 162
  • [48] The study on end-to-end security for ubiquitous commerce
    Chang, Hangbae
    JOURNAL OF SUPERCOMPUTING, 2011, 55 (02): : 228 - 245
  • [49] SIP signaling security for end-to-end communication
    Ono, K
    Tachimoto, S
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1042 - 1046
  • [50] The study on end-to-end security for ubiquitous commerce
    Hangbae Chang
    The Journal of Supercomputing, 2011, 55 : 228 - 245