DocumentCode
511671
Title
An Efficient Delegation-Based Anonymous Authentication Protocol
Author
Fu, Jianqing ; Chen, Jian ; Fan, Rong ; Chen, XiaoPing ; Ping, Lingdi
Author_Institution
Coll. of Comput. Sci. & Technol., Zhejiang Univ., Hangzhou, China
Volume
1
fYear
2009
fDate
28-30 Oct. 2009
Firstpage
558
Lastpage
562
Abstract
With the widespread use of mobile devices, authentication and privacy of identification become important issues. We analyzed the security flaws and shortcomings of a delegation-based authentication protocol which was proposed by Caimu Tang, et al., and provided an improved protocol. We use elliptic-curve cryptography and hash chain to ensure the safety of system in our scheme. The research results reveal that the improved protocol can not only corrects the security flaws but also improve the efficiency of key management and reduce the computational load.
Keywords
cryptographic protocols; data privacy; public key cryptography; authentication; delegation based authentication protocol; elliptic curve cryptography; hash chain; identification privacy; Authentication; Communication system security; Computer science; Cryptographic protocols; Educational institutions; Elliptic curve cryptography; Privacy; Public key cryptography; Random number generation; Wireless application protocol; ECC; anonymous; authentication; elliptic-curve cryptography; hash chain;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Engineering, 2009. WCSE '09. Second International Workshop on
Conference_Location
Qingdao
Print_ISBN
978-0-7695-3881-5
Type
conf
DOI
10.1109/WCSE.2009.731
Filename
5403404
Link To Document