An efficient identity-based cryptosystem for end-to-end mobile security

被引:0
|
作者
Hwu, Jing-Shyang [1 ]
Chen, Rong-Jaye [1 ]
Lin, Yi-Bing [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30010, Taiwan
关键词
end-to-end security; identity-based cryptography; mobile banking; public key;
D O I
10.1109/TWC.2006.04839
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper proposes an efficient ID-based encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20-35%.
引用
收藏
页码:2586 / 2593
页数:8
相关论文
共 50 条
  • [21] Identity-based cryptography for grid security
    Hoon Wei Lim
    Kenneth G. Paterson
    International Journal of Information Security, 2011, 10 : 15 - 32
  • [22] End-to-end security scheme for mobility enabled healthcare Internet of Things
    Moosavi, Sanaz Rahimi
    Tuan Nguyen Gia
    Nigussie, Ethiopia
    Rahmani, Amir M.
    Virtanen, Seppo
    Tenhunen, Hannu
    Isoaho, Jouni
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 64 : 108 - 124
  • [23] An end-to-end QoS and security joint management for IPTV service delivery
    Chalouf, M.A. (chalouf@labri.fr), 1600, Inderscience Enterprises Ltd. (05): : 398 - 416
  • [24] END-TO-END SECURITY: AN APPROACH TO A NATIONAL NETWORK FOR TELE-COOPERATION
    Staemmler, M.
    Walz, M.
    Weisser, G.
    Engelmann, U.
    Weininger, R.
    Ernstberger, A.
    Sturm, J.
    EHEALTH2012 - HEALTH INFORMATICS MEETS EHEALTH - VON DER WISSENSCHAFT ZUR ANWENDUNG UND ZURUCK: MOBILE HEALTH & CARE - GESUNDHEITSVORSORGE IMMER UND UBERALL, 2012, : 109 - 114
  • [25] End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC
    Moosavi, Sanaz Rahimi
    Izadifar, Arman
    SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2021, 2022, 1536 : 77 - 89
  • [26] Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things
    Sahraoui, Somia
    Bilami, Azeddine
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, MISC 2016, 2016, : 249 - 260
  • [27] 6LowPSec: An end-to-end security protocol for 6LoWPAN
    Glissaa, Ghada
    Meddeb, Aref
    AD HOC NETWORKS, 2019, 82 : 100 - 112
  • [28] Protecting against key escrow and key exposure in identity-based cryptosystem
    Wang, Jin
    Bai, Xi
    Yu, Jia
    Li, Daxing
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 148 - +
  • [29] Strong Forward Security in Identity-Based Signcryption
    Muniz, Madeline Gonzalez
    Laud, Peeter
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2013, 16 (4-5) : 235 - 258
  • [30] E2DA: Energy Efficient Data Aggregation and End-to-End Security in 3D Reconfigurable WSN
    Ramasamy, Karthick
    Anisi, Mohammad Hossein
    Jindal, Anish
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (02): : 787 - 798