Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes | IEEE Journals & Magazine | IEEE Xplore

Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

Open Access

A block diagram that describes the contribution of our article.

Abstract:

To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signa...Show More

Abstract:

To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures. In this paper, we show that an anonymous remote authentication scheme for wireless body area network, an anonymous handover authentication scheme, an authentication scheme for emergency mobile cyber-physical system, and an authenticated key agreement protocol based on the three types of signatures schemes are insecure against various impersonation attacks due to insecurity of the underlying signature schemes. These results show that using cryptographic primitives without security proofs causes serious security vulnerabilities on the security protocol itself. Our results give strong evidences that the security of adopted cryptographic primitives should be proved in appropriate formal security models as well as proof of the security protocol itself.
A block diagram that describes the contribution of our article.
Published in: IEEE Access ( Volume: 6)
Page(s): 68804 - 68812
Date of Publication: 09 November 2018
Electronic ISSN: 2169-3536

Funding Agency:


References

References is not available for this document.