Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Hi-index | 0.00 |
A node of Wireless Mesh Network could be a supplicant and an authenticator at the same time, which is under the risk of man in the middle (MITM) attack when authenticating with EAP-TLS protocol. Bi-directional authentication implemented by challenge signature and verification based on identity based signature (IBS) is introduced to avoid MITM attack. A simplified access control system which obviates multiple authentications is designed by adoption of service tickets. Requisition of PKI deployment is removed to keep the system simple and easy to maintain.