An efficient identity-based cryptosystem for end-to-end mobile security

被引:0
|
作者
Hwu, Jing-Shyang [1 ]
Chen, Rong-Jaye [1 ]
Lin, Yi-Bing [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30010, Taiwan
关键词
end-to-end security; identity-based cryptography; mobile banking; public key;
D O I
10.1109/TWC.2006.04839
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper proposes an efficient ID-based encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20-35%.
引用
收藏
页码:2586 / 2593
页数:8
相关论文
共 50 条
  • [1] The end of end-to-end security?
    Bradner, S
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [2] A Network Assisted End-to-End Security Protocol for Mobile Applications
    He, Lisha
    Zhang, Ning
    He, Lirong
    Rogers, Ian
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 159 - 165
  • [3] An efficient end-to-end security mechanism for IP multimedia subsystem
    Chen, Chi-Yuan
    Wu, Tin-Yu
    Huang, Yueh-Min
    Chao, Han-Chieh
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4259 - 4268
  • [4] Performance Evaluation on End-to-End Security Architecture for Mobile Banking System
    Narendiran, C.
    Rabara, S. Albert
    Rajendran, N.
    2008 1ST IFIP WIRELESS DAYS (WD), 2008, : 445 - +
  • [5] Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things
    Sahraoui, Somia
    Bilami, Azeddine
    COMPUTER NETWORKS, 2015, 91 : 26 - 45
  • [6] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
  • [7] End-to-End Transport Security in the IP-based Internet of Things
    Brachmann, Martina
    Keoh, Sye Loong
    Morchon, Oscar Garcia
    Kumar, Sandeep S.
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [8] AN IDENTITY-BASED CRYPTOSYSTEM FOR ENCRYPTING LONG MESSAGES
    Liu, Jiqiang
    Zhong, Sheng
    Han, Lei
    Yao, Haifan
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (06): : 3295 - 3301
  • [9] A PK-SIM card based end-to-end security framework for SMS
    He Rongyu
    Zhao Guolei
    Chang Chaowen
    Me Hui
    Qin Xi
    Qin Zheng
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 629 - 641
  • [10] Scalable end-to-end security for advanced metering infrastructures
    Nabeel, Mohamed
    Ding, Xiaoyu
    Seo, Seung-Hyun
    Bertino, Elisa
    INFORMATION SYSTEMS, 2015, 53 : 213 - 223