Improvement of an efficient user identification scheme based on ID-based cryptosystem

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In 2004, Hwang et al. proposed an efficient user identification scheme based on an ID-based cryptosystem that is suitable for the wireless/mobile environment. However, we find that their scheme is still vulnerable to impersonation attack. Accordingly, the current paper first shows the weakness of Hwang et al.'s scheme, and then presents an enhancement to resolve such problems. © IFIP International Federation for Information Processing 2005.

Cite

CITATION STYLE

APA

Yoon, E. J., & Yoo, K. Y. (2005). Improvement of an efficient user identification scheme based on ID-based cryptosystem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3823 LNCS, pp. 586–591). https://doi.org/10.1007/11596042_61

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free