An efficient identity-based cryptosystem for end-to-end mobile security

Jing-Shyang Hwu, Rong-Jaye Chen, Yi-Bing Lin
2006 IEEE Transactions on Wireless Communications  
In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the
more » ... user. This paper proposes an efficient IDbased encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20 -35%. Index Terms-End-to-end security, identity-based cryptography, mobile banking, public key.
doi:10.1109/twc.2006.1687783 fatcat:au4dqudr6bawhmdt6gpoatmcom