Anonymous authentication scheme based on one-off public key in pervasive computing environments
A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service pr...
Saved in:
Main Authors: | Chang-yuan LUO, Shi-wei HUO, Hong-zhi XING |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/1000-436X(2012)02-0093-06/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Identity-based cross-domain authentication scheme in pervasive computing environments
by: LUO Chang-yuan, et al.
Published: (2011-01-01) -
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
by: JIANG Qi1, et al.
Published: (2010-01-01) -
ID-based wireless authentication scheme with anonymity
by: ZHU Hui, et al.
Published: (2009-01-01) -
Efficient anonymous password-based authenticated key exchange scheme
by: TAN Shi-chong, et al.
Published: (2009-01-01) -
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
by: Yuehui CHEN, et al.
Published: (2016-05-01)