Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks

Tzong Sun Wu*, Chien Lung Hsu

*Corresponding author for this work

Research output: Contribution to journalJournal Article peer-review

59 Scopus citations

Abstract

In 2000, Lee and Chang (Comput Syst Sci Eng 15 (2000) 211) presented a user identification scheme that also can simultaneously achieve key exchange requirement while preserving the user anonymity. Their idea is valuable especially when it is applied to some applications in which the identity of the user should be protected from the public in the distributed computer networks. Unfortunately, our paper shows that their scheme is insecure under two attacks and we further proposed a more efficient identification scheme preserving the same merits. The proposed scheme not only effectively eliminates the security leaks of the Lee-Chang scheme, but also reduces computational complexities and communication costs as compared with their scheme.

Original languageEnglish
Pages (from-to)120-125
Number of pages6
JournalComputers and Security
Volume23
Issue number2
DOIs
StatePublished - 03 2004
Externally publishedYes

Keywords

  • Anonymity
  • Distributed computer networks
  • Factorization
  • Key distribution
  • User identification

Fingerprint

Dive into the research topics of 'Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks'. Together they form a unique fingerprint.

Cite this