Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
On-line/off-line digital signatures
CRYPTO '89 Proceedings on Advances in cryptology
Improved Online/Offline Signature Schemes
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Efficient generic on-line/off-line (threshold) signatures without key exposure
Information Sciences: an International Journal
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Identity-Based Online/Offline Encryption
Financial Cryptography and Data Security
An Efficient Identity-Based Online/Offline Encryption Scheme
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
A handover authentication using credentials based on chameleon hashing
IEEE Communications Letters
A hash-chain based authentication scheme for fast handover in wireless network
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Proactive key distribution using neighbor graphs
IEEE Wireless Communications
Hi-index | 0.00 |
With the rapid development of computer networks, wireless technologies find important applications in roaming communication. In this scenario, practical needs initiate the demand for a secure and efficient handoff authentication scheme. To the best of our knowledge, however, there exists no scheme that can simultaneously provide robust security properties and enjoy desirable efficiency. In this paper, we first examines the security of the scheme proposed in International Conference on Communications 2007 by Kim et al. and demonstrates that the scheme of Kim et al. fails to achieve perfect forward/backward secrecy. Furthermore, we propose a new identity-based construction for secure and efficient handoff authentication schemes, in which an identity-based online/offline encryption scheme is the primary ingredient. Compared with the scheme of Kim et al., our construction enjoys desirable efficiency in terms of the computation cost and the communication cost. To be specific, the developed scheme not only realizes a seamless handoff with key agreement, but also provides perfect forward/backward secrecy, which has never been achieved in any existing handoff-related schemes. Therefore, our construction is more suitable for handoff authentication in the wireless applications environment. Copyright © 2012 John Wiley & Sons, Ltd.