Title :
Hidden-ID Authentication Scheme and its SVO-Logic Based Formal Analysis
Author :
Jiang, Jin ; Li, Lei ; Huang, Zhihong
Abstract :
Generally, users are required to submit their identity in- formation at the beginning of the authentication process. Hence, adversaries can follow the tracks of specified users´ information and decrypt the corresponding authentication messages. Against these security risks caused by identity information, this paper proposes a Hidden-ID authentica- tion scheme, in which users can be authenticated without submitting their identity information directly. Meanwhile, a formal analysis of the Hidden-ID authentication scheme based on SVO Logic is also presented, which shows the pro- posed scheme meets the design objectives.
Keywords :
Authentication; Communication system security; Computational intelligence; Computer networks; Computer security; Cryptography; Information analysis; Information security; Logic design; Privacy;
Conference_Titel :
Computational Intelligence and Security, 2007 International Conference on
Conference_Location :
Harbin
Print_ISBN :
0-7695-3072-9
Electronic_ISBN :
978-0-7695-3072-7
DOI :
10.1109/CIS.2007.203