Abstract:
An authenticated key distribution scheme preserving user anonymity is important to those e-commerce applications where user anonymity is required or desirable. However, t...Show MoreMetadata
Abstract:
An authenticated key distribution scheme preserving user anonymity is important to those e-commerce applications where user anonymity is required or desirable. However, the previous works on this issue have security flaws. This article shows the security weaknesses of a recently published work, and then proposes our new scheme, which not only overcomes the weaknesses but also improves the computational performance.
Date of Conference: 23-26 July 2007
Date Added to IEEE Xplore: 08 August 2007
Print ISBN:0-7695-2913-5