• DocumentCode
    2565623
  • Title

    Hidden-ID Authentication Scheme and its SVO-Logic Based Formal Analysis

  • Author

    Jiang, Jin ; Li, Lei ; Huang, Zhihong

  • fYear
    2007
  • fDate
    15-19 Dec. 2007
  • Firstpage
    781
  • Lastpage
    784
  • Abstract
    Generally, users are required to submit their identity in- formation at the beginning of the authentication process. Hence, adversaries can follow the tracks of specified users´ information and decrypt the corresponding authentication messages. Against these security risks caused by identity information, this paper proposes a Hidden-ID authentica- tion scheme, in which users can be authenticated without submitting their identity information directly. Meanwhile, a formal analysis of the Hidden-ID authentication scheme based on SVO Logic is also presented, which shows the pro- posed scheme meets the design objectives.
  • Keywords
    Authentication; Communication system security; Computational intelligence; Computer networks; Computer security; Cryptography; Information analysis; Information security; Logic design; Privacy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Security, 2007 International Conference on
  • Conference_Location
    Harbin
  • Print_ISBN
    0-7695-3072-9
  • Electronic_ISBN
    978-0-7695-3072-7
  • Type

    conf

  • DOI
    10.1109/CIS.2007.203
  • Filename
    4415452