Abstract
In 2004, Hwang et al. proposed an efficient user identification scheme based on an ID-based cryptosystem that is suitable for the wireless/mobile environment. However, we find that their scheme is still vulnerable to impersonation attack. Accordingly, the current paper first shows the weakness of Hwang et al.’s scheme, and then presents an enhancement to resolve such problems.
Chapter PDF
Similar content being viewed by others
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Maurer, U.M., Yacobi, Y.: A Non-interactive Public-key Distribution System. Designs, Codes and Cryptography 9(3), 305–316 (1996)
Tseng, Y.M., Jan, J.K.: ID-based Cryptographic Schemes Using a Non-interactive Public-key Distribution System. In: Proceedings of the 14th Annual Computer Security Applications Conference (IEEE ACSAC 1998), Phoenix, Arizona, pp. 237–243 (1998)
Hwang, M.S., Lo, J.W., Lin, S.C.: An Efficient User Identification Scheme Based on ID-based Cryptosystem. Computer Standards & Interfaces 26(6), 565–569 (2004)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoon, EJ., Yoo, KY. (2005). Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds) Embedded and Ubiquitous Computing – EUC 2005 Workshops. EUC 2005. Lecture Notes in Computer Science, vol 3823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596042_61
Download citation
DOI: https://doi.org/10.1007/11596042_61
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30803-4
Online ISBN: 978-3-540-32296-2
eBook Packages: Computer ScienceComputer Science (R0)