In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Chao-Liang LIU, Gwoboa HORNG, Hsin-Yu LIU, "Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem" in IEICE TRANSACTIONS on Communications,
vol. E88-B, no. 5, pp. 2171-2172, May 2005, doi: 10.1093/ietcom/e88-b.5.2171.
Abstract: In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.
URL: https://global.ieice.org/en_transactions/communications/10.1093/ietcom/e88-b.5.2171/_p
Copy
@ARTICLE{e88-b_5_2171,
author={Chao-Liang LIU, Gwoboa HORNG, Hsin-Yu LIU, },
journal={IEICE TRANSACTIONS on Communications},
title={Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem},
year={2005},
volume={E88-B},
number={5},
pages={2171-2172},
abstract={In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.},
keywords={},
doi={10.1093/ietcom/e88-b.5.2171},
ISSN={},
month={May},}
Copy
TY - JOUR
TI - Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem
T2 - IEICE TRANSACTIONS on Communications
SP - 2171
EP - 2172
AU - Chao-Liang LIU
AU - Gwoboa HORNG
AU - Hsin-Yu LIU
PY - 2005
DO - 10.1093/ietcom/e88-b.5.2171
JO - IEICE TRANSACTIONS on Communications
SN -
VL - E88-B
IS - 5
JA - IEICE TRANSACTIONS on Communications
Y1 - May 2005
AB - In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.
ER -