Cryptanalysis of two identification schemes based on an ID-based cryptosystem

被引:0
|
作者
Tang, Q [1 ]
Mitchell, CJ [1 ]
机构
[1] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
IEE PROCEEDINGS-COMMUNICATIONS | 2005年 / 152卷 / 05期
关键词
D O I
10.1049/ip-com:20050095
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two identification schemes based on the Maurer-Yacobi ID-based cryptosystem are analysed and shown to suffer from serious security problems.
引用
收藏
页码:723 / 724
页数:2
相关论文
共 50 条
  • [1] Cryptanalysis of an efficient user identification scheme based on ID-based cryptosystem
    Liu, CL
    Horng, G
    Liu, HY
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) : 2171 - 2172
  • [2] Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem
    Yang, Jen-Ho
    Chang, Chin-Chen
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 3 - +
  • [3] A Novel User Identification Scheme Based on ID-Based Cryptosystem
    Wang, Hong
    Wei, Shimin
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 555 - 556
  • [4] An efficient user identification scheme based on ID-based cryptosystem
    Hwang, MS
    Lo, JW
    Lin, SC
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (06) : 565 - 569
  • [5] Efficient and secure user identification scheme based on ID-based cryptosystem
    Kim, Kee-Won
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    INTERNATIONAL E-CONFERENCE ON COMPUTER SCIENCE 2005, 2005, 2 : 79 - 82
  • [6] Improvement of an efficient user identification scheme based on ID-based cryptosystem
    Yoon, EJ
    Yoo, KY
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 586 - 591
  • [7] Cryptanalysis of the Hwang-Lo-Lin scheme based on an ID-based cryptosystem and its improvement
    Park, Haeryong
    Chun, Kilsoo
    Ahn, Seungho
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (03) : 900 - 903
  • [8] An improvement of an efficient user identification scheme based on ID-based cryptosystem
    Chou, Jue-Sam
    Chen, Yalin
    Lin, Chu-Hsing
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 558 - +
  • [9] Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy
    Peng, Jian-Wen
    Horng, Wen-Bing
    Chiu, Ying-Ching
    Liu, Chao-Sheng
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 277 - 286
  • [10] KEY CHANGEABLE ID-BASED CRYPTOSYSTEM
    KUROSAWA, K
    ELECTRONICS LETTERS, 1989, 25 (09) : 577 - 578