Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
456221 | Computers & Security | 2008 | 8 Pages |
Abstract
An authenticated key distribution scheme preserving user anonymity is important to those e-commerce applications where user anonymity is required or desirable. However, the previous works on this issue have security flaws. This paper shows the security weaknesses of a recently published work, and then proposes our new scheme, which not only overcomes the weaknesses but also improves the computational performance. The security of the proposed scheme is rigorously examined in a modified Bellare–Rogaway model.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Hung-Yu Chien,