Insecurity of a Certificate-free Ad Hoc Anonymous Authentication

نویسندگان

  • Yan Xu
  • Liusheng Huang
  • Miaomiao Tian
  • Hong Zhong
چکیده

The ring signature scheme is a simplified group signature scheme for no manager while preserving unconditionally anonymous of the signer. Certificateless cryptography is introduced for eliminating the use of certificates in Public Key Infrastructure and solving the key-escrow problem in ID-based cryptogratography. Recently, Qin et al. proposed the first RSA-based certificateless ring signature scheme which was proved unforgeable in random oracle model. In this paper, we demonstrated that this scheme was not secure against the Type I adversary.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of Certificate-Based Authentication in Mobile Ad Hoc Networks

The certificate-based authentication is well studied in wired networks. However, adapting certificatebased authentication protocols to mobile ad hoc networks (MANETs) is a nontrivial task, mainly because, in a MANET, as opposed to conventional wired networks, there typically exists no fixed infrastructure or centralized management. For example, a conventional certificate-based authentication sy...

متن کامل

A Frame Work to Estimate the Performance of Authentication Schemes in Mobile Ad Hoc Networks

An increasing growth has been witnessed in the last few year with respect to development of wireless and mobile communication networks. In MANETs, nodes are able to communicate through the use of wireless mediums, constituting dynamic topologies. The certificate-based authentication has a positive edge in wired networks. It's a significantly arduous task to adapt a certificate based authenticat...

متن کامل

Quick Message Authentication Protocol for Vehicular AD HOC Networks

Public Key Infrastructure (PKI) plays very important role in Vehicular Ad hoc Networks (VANETs). In this system; confirmation of received message can be done by checking the sender’s certificate is included in the Certificate Revocation Lists (CRLs), which means checking its revocation status, then, substantiating the sender’s certificate, and finally validating the sender’s signature. Since th...

متن کامل

Public-Key Management System using Hamming Distance for Mobile Ad Hoc Network

Mobile ad-hoc networks have various implementation constraints such as infrastructure-free, non-trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability, and so on, have been arisen in the mobile ad-hoc networks...

متن کامل

Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks

Key management for anonymous communication in mobile ad hoc networks is a critical but unsolved problem. Many current anonymous mobile ad hoc routing protocols assume that mobile users share pairwise secrets before they start an anonymous communication session. This assumption is impractical for many ad hoc scenarios where pairwise shared keys are difficult to be set up in advance. Public-key b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 18  شماره 

صفحات  -

تاریخ انتشار 2016