Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Social and Behavioral Sciences
Further Discussions On The Security Of A Nominative Signature Scheme, Lifeng Guo, Guilin Wang, Duncan S. Wong
Further Discussions On The Security Of A Nominative Signature Scheme, Lifeng Guo, Guilin Wang, Duncan S. Wong
Faculty of Engineering and Information Sciences - Papers: Part A
A nominative signature scheme allows a nominator (or signer) and a nominee (or veri¯er) to jointly generate and publish a signature in such a way that only the nominee can verify the signature and if nec- essary, only the nominee can prove to a third party that the signature is valid. In a recent work, Huang and Wang proposed a new nominative signature scheme which, in addition to the above properties, only allows the nominee to convert a nominative signature to a publicly veri¯able one. In ACISP 2005, Susilo and Mu presented several algorithms and claimed that these algorithms can …
Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang
Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang
Faculty of Engineering and Information Sciences - Papers: Part A
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2AP, which are recently proposed by Peris-Lopez et al.We identify two e®ective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchro- nization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol runs. The latter attack can disclose all the secret information stored on a tag by interrogating the tag multiple times. Thus it compromises the tag completely. Moreover, we point …
Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao
Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao
Faculty of Engineering and Information Sciences - Papers: Part A
A nominative signature scheme allows a nominator (i.e. the signer) and a nominee (i.e. a designated verifier) to jointly generate and publish a signature so that only the nominee can check the validity of a nominative signature and further convince a third party to accept this fact. Recently, Huang and Wang proposed such a new scheme at ACISP 2004, and claimed that their scheme is secure under some standard computational assumptions. In this paper, we remark that their scheme is not a nominative signature in fact, since it fails to meet the crucial security requirement: verification untransferability. Specifically, we identify …