본문 바로가기 메뉴바로가기

Papers

Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

https://doi.org/10.1109/ACCESS.2018.2879961

  • Author심경아
  • JournalIEEE Access (2169-3536), 6, 68804 ~ 68812
  • Enrollment typeSCIE
  • publication date 20181109
To achieve source authentication, message integrity, and non-repudiation, a number of authen-tication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certicateless signatures. In this paper, we show that an anonymous remote authentication scheme for wireless body area network, an anonymous handover authentication scheme, an authentication scheme for emergency mobile cyber-physical system, and an authenticated key agreement protocol based on the three types of signatures schemes are insecure against various impersonation attacks due to insecurity of the underlying signature schemes. These results showthat using cryptographic primitives without security proofs causes serious security vulnerabilities on the security protocol itself. Our results give strong evidences that the security of adopted cryptographic primitives should be proved in appropriate formal security models as well as proof of the security protocol itself.