Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A Non-interactive Public-Key Distribution System
Designs, Codes and Cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Hi-index | 0.00 |
In 2004, Hwang et al. proposed an efficient user identification scheme based on an ID-based cryptosystem that is suitable for the wireless/mobile environment. However, we find that their scheme is still vulnerable to impersonation attack. Accordingly, the current paper first shows the weakness of Hwang et al.’s scheme, and then presents an enhancement to resolve such problems.