Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem

Chao-Liang LIU  Gwoboa HORNG  Hsin-Yu LIU  

Publication
IEICE TRANSACTIONS on Communications   Vol.E88-B   No.5   pp.2171-2172
Publication Date: 2005/05/01
Online ISSN: 
DOI: 10.1093/ietcom/e88-b.5.2171
Print ISSN: 0916-8516
Type of Manuscript: LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptanalysis,  user identification,  ID-based cryptosystem,  wireless network,  

Full Text: PDF>>
Buy this Article




Summary: 
In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.