An efficient identity-based cryptosystem for end-to-end mobile security

被引:0
作者
Hwu, Jing-Shyang [1 ]
Chen, Rong-Jaye [1 ]
Lin, Yi-Bing [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30010, Taiwan
关键词
end-to-end security; identity-based cryptography; mobile banking; public key;
D O I
10.1109/TWC.2006.04839
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper proposes an efficient ID-based encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20-35%.
引用
收藏
页码:2586 / 2593
页数:8
相关论文
共 50 条
  • [31] Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
    Dahlmanns, Markus
    Pennekamp, Jan
    Fink, Ina Berenice
    Schoolmann, Bernd
    Wehrle, Klaus
    Henze, Martin
    SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2021, : 78 - 87
  • [32] REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT
    Li, Cui
    Chen, Rongmao
    Wang, Yi
    Xing, Qianqian
    Wang, Baosheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4526 - 4542
  • [33] Research on End-to-End Security Authentication Protocol of NB-IoT for Smart Grid Based on Physical Unclonable Function
    Liu, Donglan
    Liu, Xin
    Zhang, Hao
    Yu, Hao
    Wang, Wenting
    Ma, Lei
    Chen, Jianfei
    Li, Dong
    2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 239 - 244
  • [34] An efficient identity-based broadcast signcryption scheme
    Luo, Ming
    Zou, Chunhua
    Xu, Jianfeng
    Journal of Software, 2012, 7 (02) : 366 - 373
  • [35] Efficient Identity-Based Key Issue With TPM
    Guan, Zhi
    Sun, Huiping
    Chen, Zhong
    Nan, Xianghao
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2354 - 2359
  • [36] Security Proofs for Identity-Based Identification and Signature Schemes
    Bellare, Mihir
    Namprempre, Chanathip
    Neven, Gregory
    JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 1 - 61
  • [37] Efficient Identity-Based Signcryption in the Standard Model
    Li, Fagen
    Bin Muhaya, Fahad
    Zhang, Mingwu
    Takagi, Tsuyoshi
    PROVABLE SECURITY, 2011, 6980 : 120 - +
  • [38] Security Proofs for Identity-Based Identification and Signature Schemes
    Mihir Bellare
    Chanathip Namprempre
    Gregory Neven
    Journal of Cryptology, 2009, 22 : 1 - 61
  • [39] On the Security of An Identity-based Single-sign-on Scheme
    Zhang, Jianhong
    Liu, Xue
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2010, : 117 - 120
  • [40] Group Anonymous D2D Communication with End-to-End Security in LTE-A
    Hsu, Ruei-Hau
    Lee, Jemin
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 451 - 459