An efficient identity-based cryptosystem for end-to-end mobile security

被引:0
作者
Hwu, Jing-Shyang [1 ]
Chen, Rong-Jaye [1 ]
Lin, Yi-Bing [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30010, Taiwan
关键词
end-to-end security; identity-based cryptography; mobile banking; public key;
D O I
10.1109/TWC.2006.04839
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper proposes an efficient ID-based encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20-35%.
引用
收藏
页码:2586 / 2593
页数:8
相关论文
共 50 条
  • [41] MADTLS: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
    Wagner, Eric
    Heye, David
    Serror, Martin
    Kunze, Ike
    Wehrle, Klaus
    Henze, Martin
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 972 - 986
  • [42] Security analysis of batch verification on identity-based signature schemes
    Chiang, Han-Fei
    Yen, Sung-Ming
    Lin, Hsi-Chung
    PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 50 - +
  • [43] Efficient identity-based key encapsulation to multiple parties
    Barbosa, M
    Farshim, P
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 428 - 441
  • [44] On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
    Sun, Ying
    Yu, Yong
    Zhang, Xiaosong
    Chai, Jiwen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (03) : 721 - 723
  • [45] Body Sensor Network Security: An Identity-Based Cryptography Approach
    Tan, Chiu C.
    Wang, Haodong
    Zhong, Sheng
    Li, Qun
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 148 - 153
  • [46] Efficient hierarchical identity-based signatures from lattices
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (01) : 1 - 10
  • [47] lwEPSep: A Lightweight End-to-end Privacy-preserving Security Protocol for CTI Sharing in IoT Environments
    Park, Hoonyong
    Kim, Jiyoon
    Lee, Sangmin
    Duguma, Daniel Gerbi
    You, Ilsun
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (05): : 1069 - 1081
  • [48] An Efficient Identity-Based Signcryption Scheme for Multiple Receivers
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Srinivasan, Rahul
    Rangan, Chandrasekaran Pandu
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 71 - +
  • [49] Efficient Identity-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
  • [50] Efficient and Short Identity-Based Deniable Authenticated Encryption
    Jin, Chunhua
    Zhao, Jianyang
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 244 - 255