DocumentCode
3722181
Title
Cryptanalysis of Two Identification Schemes
Author
Syh-Yuan Tan;Ji-Jian Chin;Rouzbeh Behnia
Author_Institution
Fac. of Inf. Sci. &
fYear
2015
Firstpage
1
Lastpage
4
Abstract
Identification scheme is a cryptographic authentication protocol which allows a client to convince the corresponding server on the authenticity of his identity, without the need to share his secret with the server. In this paper, we cryptanalyze two identification schemes and show that they are not secure against impersonation under passive attack. We also propose a fix for one of the schemes to upgrade their security to secure against impersonation under passive, active and concurrent attacks.
Keywords
"Protocols","Servers","Elliptic curves","Elliptic curve cryptography"
Publisher
ieee
Conference_Titel
Information Science and Security (ICISS), 2015 2nd International Conference on
Type
conf
DOI
10.1109/ICISSEC.2015.7370991
Filename
7370991
Link To Document