본문 바로가기 주메뉴 바로가기
검색 검색영역닫기 검색 검색영역닫기 ENGLISH 메뉴 전체보기 메뉴 전체보기

논문

Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

등록일자 :

https://doi.org/10.1109/ACCESS.2018.2879961

  • 저자심경아
  • 학술지IEEE Access (2169-3536), 6, 68804 ~ 68812
  • 등재유형SCIE
  • 게재일자 20181109
To achieve source authentication, message integrity, and non-repudiation, a number of authen-tication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certicateless signatures. In this paper, we show that an anonymous remote authentication scheme for wireless body area network, an anonymous handover authentication scheme, an authentication scheme for emergency mobile cyber-physical system, and an authenticated key agreement protocol based on the three types of signatures schemes are insecure against various impersonation attacks due to insecurity of the underlying signature schemes. These results showthat using cryptographic primitives without security proofs causes serious security vulnerabilities on the security protocol itself. Our results give strong evidences that the security of adopted cryptographic primitives should be proved in appropriate formal security models as well as proof of the security protocol itself.

이 페이지에서 제공하는 정보에 대해 만족하십니까?