{"title":"Cryptographic identification of users over network","authors":"N. Ikram","doi":"10.1109/MILCOM.2001.985764","DOIUrl":null,"url":null,"abstract":"In a network, identification of any user is a vital requirement before one is accorded access to the network-shared information bank or database. The database or information may itself either be encrypted or in plain language. There are various techniques, which offer this service through cryptographic techniques as well as through non-cryptographic means, each with its own attributes This paper presents a scheme which uses the identification (ID) based cryptosystem (Shamir, 1984), based on the concept of public key cryptosystem. However, the scheme works on a carefully selected elliptic curve (EC), itself defined on a binary finite field. The finite field so chosen is F/sub 2//sup 215/. The elliptic curve over which the scheme works has been self-generated and those available in the public domain have not been employed. The new scheme offers highly secure underlying cryptosystem and strong challenge-response type of protocol, ensuring complete user trust.","PeriodicalId":136537,"journal":{"name":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2001-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2001.985764","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In a network, identification of any user is a vital requirement before one is accorded access to the network-shared information bank or database. The database or information may itself either be encrypted or in plain language. There are various techniques, which offer this service through cryptographic techniques as well as through non-cryptographic means, each with its own attributes This paper presents a scheme which uses the identification (ID) based cryptosystem (Shamir, 1984), based on the concept of public key cryptosystem. However, the scheme works on a carefully selected elliptic curve (EC), itself defined on a binary finite field. The finite field so chosen is F/sub 2//sup 215/. The elliptic curve over which the scheme works has been self-generated and those available in the public domain have not been employed. The new scheme offers highly secure underlying cryptosystem and strong challenge-response type of protocol, ensuring complete user trust.