The search functionality is under construction.
The search functionality is under construction.

Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem

Chao-Liang LIU, Gwoboa HORNG, Hsin-Yu LIU

  • Full Text Views

    0

  • Cite this

Summary :

In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.

Publication
IEICE TRANSACTIONS on Communications Vol.E88-B No.5 pp.2171-2172
Publication Date
2005/05/01
Publicized
Online ISSN
DOI
10.1093/ietcom/e88-b.5.2171
Type of Manuscript
LETTER
Category
Fundamental Theories for Communications

Authors

Keyword