Abstract | ||
---|---|---|
AbstractIn this paper, we present a novel anonymous authentication scheme without employing any symmetric or asymmetric cryptosystem. The security of our scheme is guaranteed by the basic theories for solving linear equations, which can ensure it is unconditionally secure. The proposed scheme is adaptable for resource-constrained devices or wireless networks well, because it only needs to perform several scalar multiplications instead of complex cryptographic operations and takes only one round of message exchange challenge-response between the verification centre and the legal user. Copyright © 2012 John Wiley & Sons, Ltd. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1002/ett.2606 | Periodicals |
Field | DocType | Volume |
Wireless network,Linear equation,Computer science,Cryptography,Scalar (physics),Computer network,Theoretical computer science,Cryptosystem,Authentication scheme | Journal | 25 |
Issue | ISSN | Citations |
9 | 2161-3915 | 1 |
PageRank | References | Authors |
0.35 | 11 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Run-hua Shi | 1 | 78 | 13.07 |
Hong Zhong | 2 | 90 | 18.46 |
Liusheng Huang | 3 | 1082 | 123.52 |