Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem

Chao-Liang LIU
Gwoboa HORNG
Hsin-Yu LIU

Publication
IEICE TRANSACTIONS on Communications   Vol.E88-B    No.5    pp.2171-2172
Publication Date: 2005/05/01
Online ISSN: 
DOI: 10.1093/ietcom/e88-b.5.2171
Print ISSN: 0916-8516
Type of Manuscript: LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptanalysis,  user identification,  ID-based cryptosystem,  wireless network,  

Full Text: PDF(52.1KB)>>
Buy this Article



Summary: 
In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.