For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem
Chao-Liang LIU Gwoboa HORNG Hsin-Yu LIU
IEICE TRANSACTIONS on Communications
Publication Date: 2005/05/01
Print ISSN: 0916-8516
Type of Manuscript: LETTER
Category: Fundamental Theories for Communications
cryptanalysis, user identification, ID-based cryptosystem, wireless network,
Full Text: PDF>>
In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.