Abstract
A user identification scheme was proposed by Tseng et al. in 1998, as one of applications that are based on the ideas of ID-based cryptosystems. Recently, Hwang et al. presented an improvement of the Tseng et al.' scheme for wireless mobile environment. In wireless environment, the time for waiting and responding of a mobile device must be reduced due to the lack of the capacity of the battery. The authors tried to achieve this goal by optimizing the pass of the scheme. However, here we show their scheme has some limitation for practical usage in the sense that it is not secure against a key compromise impersonation attack.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.