An Efficient Delegation-Based Anonymous Authentication Protocol

Jianqing Fu,Jian Chen,Rong Fan,XiaoPing Chen,Lingdi Ping
DOI: https://doi.org/10.1109/wcse.2009.731
2009-01-01
Abstract:With the widespread use of mobile devices, authentication and privacy of identification become important issues. We analyzed the security flaws and shortcomings of a delegation-based authentication protocol which was proposed by Caimu Tang, et al., and provided an improved protocol. We use elliptic-curve cryptography and hash chain to ensure the safety of system in our scheme. The research results reveal that the improved protocol can not only corrects the security flaws but also improve the efficiency of key management and reduce the computational load.
What problem does this paper attempt to address?