User Identification and Key Distribution Scheme with Anonymity for Distributed Computer Network
Date Issued
2009
Date
2009
Author(s)
Hsu, Wen-Hsun
Abstract
User identification and key distribution schemes with anonymity are attached great importance to distributed computer networks where the privacy of a service requester can be protected. In 2000, Lee and Chang first presented a user identification scheme that also can simultaneously achieve key exchange requirement while preserving the user anonymity. In 2009, Hsu and Chuang proposed an efficient user identification scheme with key distribution preserving user anonymity for distributed computer networks. In their scheme, (1) each service provider does not need to maintain a password table for identifying users; (2) each user only keeps one secret token and can obtain the services from different service providers; (3) when a new service provider joins the system, the users do not need to update the secret token. In this thesis, we show that the impersonation attack can work in Hsu-Chuang’s scheme and then propose a new method to enhance the security level and the efficiency. By our simulation and analysis, the computation and communication cost is better than related schemes.
Subjects
Anonymity
distributed computer network
identification
key distribution
Type
thesis
File(s)![Thumbnail Image]()
Loading...
Name
ntu-98-R96921012-1.pdf
Size
23.32 KB
Format
Adobe PDF
Checksum
(MD5):68d50d75f08af985948e6d4cd2dc1a9d
