An efficient identity-based cryptosystem for end-to-end mobile security

Jing Shyang Hwu*, Rong-Jaye Chen, Yi-Bing Lin

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

27 Scopus citations


In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper proposes an efficient IDbased encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20-35%.

Original languageEnglish
Article number1687783
Pages (from-to)2586-2593
Number of pages8
JournalIEEE Transactions on Wireless Communications
Issue number9
StatePublished - 1 Sep 2006


  • End-to-end security
  • Identity-based cryptography
  • Mobile banking
  • Public key

Fingerprint Dive into the research topics of 'An efficient identity-based cryptosystem for end-to-end mobile security'. Together they form a unique fingerprint.

Cite this