메뉴 건너뛰기




Volumn 5, Issue 10, 2012, Pages 1121-1130

Identity-based construction for secure and efficient handoff authentication schemes in wireless networks

Author keywords

Discrete logarithm; Handoff authentication; Identity based cryptography; Perfect forward backward secrecy; Wireless network

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; EFFICIENCY; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84867624228     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.421     Document Type: Article
Times cited : (19)

References (28)
  • 1
    • 84867615498 scopus 로고    scopus 로고
    • Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs
    • Sarkar P, Saha A. Security enhanced communication in wireless sensor networks using Reed-Muller codes and partially balanced incomplete block designs. Journal of Convergence 2011; 2(1): 23-30.
    • (2011) Journal of Convergence , vol.2 , Issue.1 , pp. 23-30
    • Sarkar, P.1    Saha, A.2
  • 4
    • 84862238713 scopus 로고    scopus 로고
    • An enhanced technique for vertical handover of multimedia traffic between WLAN and EVDO
    • Javed K, Saleem U, Hussain K, Sher M. An enhanced technique for vertical handover of multimedia traffic between WLAN and EVDO. Journal of Convergence 2010; 1(1): 107-112.
    • (2010) Journal of Convergence , vol.1 , Issue.1 , pp. 107-112
    • Javed, K.1    Saleem, U.2    Hussain, K.3    Sher, M.4
  • 5
    • 67651062654 scopus 로고    scopus 로고
    • A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6
    • Choi J, Jung S. A secure and efficient handover authentication based on light-weight Diffie-Hellman on mobile node in FMIPv6. IEICE Transactions on Communications 2008; E-91B(2): 605-608.
    • (2008) IEICE Transactions on Communications , vol.E91B , Issue.2 , pp. 605-608
    • Choi, J.1    Jung, S.2
  • 6
    • 33744920849 scopus 로고    scopus 로고
    • A hash-chain based authentication scheme for fast handover in wireless network
    • LNCS, Springer-Verlag: Berlin Heidelberg
    • Hong K, Jung S, Wu S. A hash-chain based authentication scheme for fast handover in wireless network. In WISA 2005. LNCS, Vol. 3786. Springer-Verlag: Berlin Heidelberg, 2006; 96-107.
    • (2006) WISA 2005 , vol.3786 , pp. 96-107
    • Hong, K.1    Jung, S.2    Wu, S.3
  • 8
    • 7244227670 scopus 로고    scopus 로고
    • Fast handoff scheme based on mobility prediction in public wireless LAN systems
    • Pack S, Choi Y. Fast handoff scheme based on mobility prediction in public wireless LAN systems. IEE Proceedings Communications 2004; 151(5): 489-495.
    • (2004) IEE Proceedings Communications , vol.151 , Issue.5 , pp. 489-495
    • Pack, S.1    Choi, Y.2
  • 9
    • 33744909327 scopus 로고    scopus 로고
    • Fast authentication for inter-domain handover
    • LNCS, Springer-Verlag: Berlin Heidelberg
    • Wang H, Prasad A. Fast authentication for inter-domain handover. In ICT 2004. LNCS, Vol. 3124. Springer-Verlag: Berlin Heidelberg, 2004; 973-982.
    • (2004) ICT 2004 , vol.3124 , pp. 973-982
    • Wang, H.1    Prasad, A.2
  • 10
    • 51649098802 scopus 로고    scopus 로고
    • A location privacy preserving authentication scheme in vehicular networks
    • IEEE Communications Society: Las Vegas
    • Zhang C, Lu R, Ho P, Chen A. A location privacy preserving authentication scheme in vehicular networks. In WCNC 2008. IEEE Communications Society: Las Vegas. 2008; 2543-2548.
    • (2008) WCNC 2008 , pp. 2543-2548
    • Zhang, C.1    Lu, R.2    Ho, P.3    Chen, A.4
  • 11
    • 84947613589 scopus 로고    scopus 로고
    • 802.11i Overview. IEEE.802.11-04/0123r1
    • Chaplin C, Qi E, Ptasinski H, Walker J, Li S. 802.11i Overview. IEEE.802.11-04/0123r1. http://www.drizzle.com/aboba/IEEE, February 2005.
    • (2005)
    • Chaplin, C.1    Qi, E.2    Ptasinski, H.3    Walker, J.4    Li, S.5
  • 12
    • 75449110407 scopus 로고    scopus 로고
    • A handover authentication using credentials based on chameleon hashing
    • Choi J, Jung S. A handover authentication using credentials based on chameleon hashing. IEEE Communication Letters 2010; 14(1): 54-56.
    • (2010) IEEE Communication Letters , vol.14 , Issue.1 , pp. 54-56
    • Choi, J.1    Jung, S.2
  • 13
    • 84959444946 scopus 로고    scopus 로고
    • Chameleon signatures
    • San Diego
    • Krawczyk H, Rabin T. Chameleon signatures. In NDSS 2000. San Diego, 2000; 143-154.
    • (2000) NDSS 2000 , pp. 143-154
    • Krawczyk, H.1    Rabin, T.2
  • 14
    • 78650029126 scopus 로고    scopus 로고
    • Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing
    • Yoon E, Khan M, Yoo K. Cryptanalysis of a handover authentication scheme using credentials based on chameleon hashing. IEICE Transactions on Information and Systems 2010; E93-D(12): 3400-3402.
    • (2010) IEICE Transactions on Information and Systems , vol.E93D , Issue.12 , pp. 3400-3402
    • Yoon, E.1    Khan, M.2    Yoo, K.3
  • 15
    • 38549176356 scopus 로고    scopus 로고
    • SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography
    • IEEE Communications Society: Glasgow
    • Kim Y, Ren W, Jo J, Yang M, Jiang Y, Zheng J. SFRIC: a secure fast roaming scheme in wireless LAN using ID-based cryptography. In ICC 2007. IEEE Communications Society: Glasgow, 2007; 1570-1575.
    • (2007) ICC 2007 , pp. 1570-1575
    • Kim, Y.1    Ren, W.2    Jo, J.3    Yang, M.4    Jiang, Y.5    Zheng, J.6
  • 16
    • 84947616568 scopus 로고    scopus 로고
    • Identity based online/offline encryption scheme., Full version available at
    • Sharmila S, Sree S, Pandu C. Identity based online/offline encryption scheme. 2010, Full version available at http://eprint.iacr.org/2010/178.
    • (2010)
    • Sharmila, S.1    Sree, S.2    Pandu, C.3
  • 17
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer-Verlag: Berlin Heidelberg
    • Shamir A. Identity-based cryptosystems and signature schemes. In Advances in Cryptology-Crypto 1984. Springer-Verlag: Berlin Heidelberg, 1984; 47-53.
    • (1984) Advances in Cryptology-Crypto 1984 , pp. 47-53
    • Shamir, A.1
  • 18
    • 85028913061 scopus 로고
    • On-line/off-line digital signatures
    • LNCS 2442. Springer-Verlag: Berlin Heidelberg
    • Even S, Goldreich O, Micali S. On-line/off-line digital signatures. In Advances in Cryptology-Crypto 1989. LNCS 2442. Springer-Verlag: Berlin Heidelberg, 1989; 263-277.
    • (1989) Advances in Cryptology-Crypto 1989 , pp. 263-277
    • Even, S.1    Goldreich, O.2    Micali, S.3
  • 20
    • 84880883264 scopus 로고    scopus 로고
    • Improved online/offline signature schemes
    • LNCS 2139. Springer-Verlag: Berlin Heidelberg
    • Shamir A, Tauman Y. Improved online/offline signature schemes. In Advances in Cryptology-Crypto 2001. LNCS 2139. Springer-Verlag: Berlin Heidelberg, 2001; 355-367.
    • (2001) Advances in Cryptology-Crypto 2001 , pp. 355-367
    • Shamir, A.1    Tauman, Y.2
  • 21
    • 38049075273 scopus 로고    scopus 로고
    • Efficient generic on-line/off-line signatures without key exposure
    • LNCS 4521. Springer-Verlag: Berlin Heidelberg
    • Chen XF, Zhang FG, Susilo W, Mu Y. Efficient generic on-line/off-line signatures without key exposure. In ACNS 2007. LNCS 4521. Springer-Verlag: Berlin Heidelberg, 2007; 18-30.
    • (2007) ACNS 2007 , pp. 18-30
    • Chen, X.F.1    Zhang, F.G.2    Susilo, W.3    Mu, Y.4
  • 22
    • 49849102704 scopus 로고    scopus 로고
    • Efficient generic on-line/off-line (threshold) signatures without key exposure
    • Chen XF, Zhang FG, Susilo W, Mu Y, Lee H, Kim K. Efficient generic on-line/off-line (threshold) signatures without key exposure. Information Sciences 2008; 178(21): 4192-4203.
    • (2008) Information Sciences , vol.178 , Issue.21 , pp. 4192-4203
    • Chen, X.F.1    Zhang, F.G.2    Susilo, W.3    Mu, Y.4    Lee, H.5    Kim, K.6
  • 23
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • 2139 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg
    • Boneh D, Franklin M. Identity-based encryption from the weil pairing. In Proceedings of Crypto 2001, Vol. 2139 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg, 2001; 213-229.
    • (2001) Proceedings of Crypto 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 24
    • 54249155201 scopus 로고    scopus 로고
    • Identity-based online/offline encryption
    • 5143 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg
    • Guo F, Mu Y, Chen Z. Identity-based online/offline encryption. In FC 2008, Vol. 5143 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg, 2008; 247-261.
    • (2008) FC 2008 , pp. 247-261
    • Guo, F.1    Mu, Y.2    Chen, Z.3
  • 25
    • 68849125731 scopus 로고    scopus 로고
    • An efficient identity-based online/offline encryption scheme
    • 5536 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg
    • Liu J, Zhou J. An efficient identity-based online/offline encryption scheme. In ACNS 2009, Vol. 5536 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg, 2009; 156-167.
    • (2009) ACNS 2009 , pp. 156-167
    • Liu, J.1    Zhou, J.2
  • 27
    • 82955246861 scopus 로고    scopus 로고
    • Implementing the Tate pairing
    • 2369 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg
    • Galbraith S, Harrison K, Soldera D. Implementing the Tate pairing. In ANTS 2002, Vol. 2369 of Lecture Notes in Computer Science. Springer-Verlag: Berlin Heidelberg, 2002; 324-337.
    • (2002) ANTS 2002 , pp. 324-337
    • Galbraith, S.1    Harrison, K.2    Soldera, D.3
  • 28
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • Lenstra A, Verheul E. Selecting cryptographic key sizes. Journal of Cryptology 2001; 14(4): 255-293.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.1    Verheul, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.