Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing
スポンサーリンク
概要
- 論文の詳細を見る
Quite recently [IEEE Commu. Letters, Vol.14, No.1, 2010], Choi et al. proposed a handover authentication scheme using credentials based on chameleon hashing, claiming to provide several security features including Perfect Forward/Backward Secrecy (PFS/PBS). This paper examines the security of the scheme and shows that the scheme still fails to achieve PFS/PBS unlike their claims.
- (社)電子情報通信学会の論文
- 2010-12-01
著者
-
Yoo Kee-young
School Of Electrical Engineering And Computer Science Kyungpook National University
-
Yoo Kee‐young
Kyungpook National Univ. Daegu Kor
-
Yoon Eun‐jun
Kyungpook National Univ. Daegu Kor
-
Yoon Eun-jun
School Of Electrical Engineering And Computer Science Kyungpook National University
-
Khan Muhammad
Center Of Excellence In Information Assurance (coeia) King Saud University
-
Yoo Kee-young
School Of Computer Science And Engineering College Of It Engineering Kyungpook National University
-
Yoon Eun-jun
School Of Computer Engineering Kyungil University
関連論文
- An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
- Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards(Fundamental Theories for Communications)
- Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks(Fundamental Theories for Communications)
- Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing
- Improvement of the Efficient Secret Broadcast Scheme
- A Biometric Authenticated Key Agreement Protocol for Secure Token
- A Robust Security Mechanism for Mobile Commerce Transactions
- Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability
- Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System
- Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
- On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
- Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications