Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem

Chao-Liang LIU  Gwoboa HORNG  Hsin-Yu LIU  

IEICE TRANSACTIONS on Communications   Vol.E88-B   No.5   pp.2171-2172
Publication Date: 2005/05/01
Online ISSN: 
DOI: 10.1093/ietcom/e88-b.5.2171
Print ISSN: 0916-8516
Type of Manuscript: LETTER
Category: Fundamental Theories for Communications
cryptanalysis,  user identification,  ID-based cryptosystem,  wireless network,  

Full Text: PDF>>
Buy this Article

In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks.