On the security of efficient user identification scheme

作者:

Highlights:

摘要

A user identification scheme was proposed by Tseng et al. in 1998, as one of applications that are based on the ideas of ID-based cryptosystems. Recently, Hwang et al. presented an improvement of the Tseng et al.’ scheme for wireless mobile environment. In wireless environment, the time for waiting and responding of a mobile device must be reduced due to the lack of the capacity of the battery. The authors tried to achieve this goal by optimizing the pass of the scheme. However, here we show their scheme has some limitation for practical usage in the sense that it is not secure against a key compromise impersonation attack.

论文关键词:Cryptography,User identification,ID-based public cryptosystem,Key compromise impersonation

论文评审过程:Available online 22 March 2005.

论文官网地址:https://doi.org/10.1016/j.amc.2005.01.107