2004
DOI: 10.1016/j.csi.2004.03.006
|View full text |Cite
|
Sign up to set email alerts
|

An efficient user identification scheme based on ID-based cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
43
0

Year Published

2005
2005
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(43 citation statements)
references
References 3 publications
0
43
0
Order By: Relevance
“…Tseng and Jan also used the squaring method and Jacobi symbol to generate each user's secret key corresponding to the identification. However, Hwang et al [4] pointed out that Tseng and Jan's user identification scheme needed too many communications between users, which was not suitable for the wireless environments because the battery capacity of a mobile device is limited. Therefore, Hwang et al proposed an efficient ID-based user identification scheme for the wireless environment.…”
Section: Introductionmentioning
confidence: 97%
See 1 more Smart Citation
“…Tseng and Jan also used the squaring method and Jacobi symbol to generate each user's secret key corresponding to the identification. However, Hwang et al [4] pointed out that Tseng and Jan's user identification scheme needed too many communications between users, which was not suitable for the wireless environments because the battery capacity of a mobile device is limited. Therefore, Hwang et al proposed an efficient ID-based user identification scheme for the wireless environment.…”
Section: Introductionmentioning
confidence: 97%
“…However, Shamir only proposed an ID-based signature scheme, and he issued two open problems to find an ID-based cryptosystem and an ID-based public key distribution scheme in his paper. Since then, many related schemes have been proposed [3,4,5,7,12]. All these schemes have a common feature.…”
Section: Introductionmentioning
confidence: 99%
“…After 2004 several IDbased cryptosystems [9,12,[15][16][17][18] have been proposed. But in these schemes, the public key of each entity is not only an identity, but also some random number selected either by the entity or by the trusted authority.…”
Section: Introductionmentioning
confidence: 99%
“…In 2004, Wei Bin lee & Kuan Chieh Liao [13] design a transformation process that can transfer all of the discrete logarithm based cryptosystems into the ID-based systems rather than reinvent a new system .After 2004 Several IDBased cryptosystems [21,22,23,24,25,26] have been proposed. But in these schemes, the public key of each entity is not only an identity, but also some random number selected either by the entity or by the trusted authority.…”
Section: Introductionmentioning
confidence: 99%