|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem
Chao-Liang LIU Gwoboa HORNG Hsin-Yu LIU
Publication
IEICE TRANSACTIONS on Communications
Vol.E88-B
No.5
pp.2171-2172 Publication Date: 2005/05/01 Online ISSN:
DOI: 10.1093/ietcom/e88-b.5.2171 Print ISSN: 0916-8516 Type of Manuscript: LETTER Category: Fundamental Theories for Communications Keyword: cryptanalysis, user identification, ID-based cryptosystem, wireless network,
Full Text: PDF(52.1KB)>>
Summary:
In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.
|
|
|