Nanhua University

Displaying 1-6 of 6 results

  • White Papers // Nov 2013

    ECC-Based Non-Interactive Deniable Authentication with Designated Verifier

    Recently, researchers have proposed many Non-Interactive Deniable Authentication (NIDA) protocols. Most of them claim that their protocols possess full deniability. However, after reviewing, the authors found that they either cannot achieve full deniability, or suffer KCI or SKCI attack; moreover, lack efficiency, because they are mainly based on DLP, factoring...

    Provided By Nanhua University

  • White Papers // Jun 2013

    Efficient Two-Pass Anonymous Identity Authentication Using Smart Card

    Recently, the researcher proposed an enhancement on a remote authentication scheme designed by another researcher which emphasizes on using dynamic identity. They claim that their improvement can avoid insider attack. However, the authors found the scheme lacks the anonymity property. Moreover, researcher indicates their scheme also suffers the insider attack....

    Provided By Nanhua University

  • White Papers // Jul 2012

    Comments on Four Multi-Server Authentication Protocols Using Smartcard

    A two-party password authentication protocol for client-server architecture is usually not sufficient when network size increases, especially for an open network such as Internet. Thus, researchers have proposed several multi-server authentication protocols to cope with this problem. In 2003, Li et al. proposed a multi-server protocol based on the ElGamal...

    Provided By Nanhua University

  • White Papers // Aug 2011

    An Efficient RFID Mutual Authentication Scheme Based on ECC

    Recently, Radio Frequency IDentification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-Public Key Cryptosystem (PKC)-based and PKC-based. However, many of them have been found to...

    Provided By Nanhua University

  • White Papers // Jun 2010

    Cryptanalysis on Four Two-Party Authentication Protocols

    In the paper, the authors have investigated four authentication protocols. In Bindu et al scheme an insider can employ his own secrecy in the smart card issued from the server to successfully impersonate another user by getting the victim?s smart card. In both Goriparthi et al.?s and Wang et al.?s...

    Provided By Nanhua University

  • White Papers // Jul 2009

    Security Weaknesses in Two Multi-Server Password Based Authentication Protocols

    In 2004 and 2005, Tsaur et al. proposed a smart card based password authentication schemes for multi-server environments, respectively. They claimed that their protocols are safe and can withstand various kinds of attacks. However, after analysis, the authors found their schemes each have some secure loopholes. In this paper, they...

    Provided By Nanhua University

  • White Papers // Jul 2012

    Comments on Four Multi-Server Authentication Protocols Using Smartcard

    A two-party password authentication protocol for client-server architecture is usually not sufficient when network size increases, especially for an open network such as Internet. Thus, researchers have proposed several multi-server authentication protocols to cope with this problem. In 2003, Li et al. proposed a multi-server protocol based on the ElGamal...

    Provided By Nanhua University

  • White Papers // Jun 2010

    Cryptanalysis on Four Two-Party Authentication Protocols

    In the paper, the authors have investigated four authentication protocols. In Bindu et al scheme an insider can employ his own secrecy in the smart card issued from the server to successfully impersonate another user by getting the victim?s smart card. In both Goriparthi et al.?s and Wang et al.?s...

    Provided By Nanhua University

  • White Papers // Nov 2013

    ECC-Based Non-Interactive Deniable Authentication with Designated Verifier

    Recently, researchers have proposed many Non-Interactive Deniable Authentication (NIDA) protocols. Most of them claim that their protocols possess full deniability. However, after reviewing, the authors found that they either cannot achieve full deniability, or suffer KCI or SKCI attack; moreover, lack efficiency, because they are mainly based on DLP, factoring...

    Provided By Nanhua University

  • White Papers // Jun 2013

    Efficient Two-Pass Anonymous Identity Authentication Using Smart Card

    Recently, the researcher proposed an enhancement on a remote authentication scheme designed by another researcher which emphasizes on using dynamic identity. They claim that their improvement can avoid insider attack. However, the authors found the scheme lacks the anonymity property. Moreover, researcher indicates their scheme also suffers the insider attack....

    Provided By Nanhua University

  • White Papers // Jul 2009

    Security Weaknesses in Two Multi-Server Password Based Authentication Protocols

    In 2004 and 2005, Tsaur et al. proposed a smart card based password authentication schemes for multi-server environments, respectively. They claimed that their protocols are safe and can withstand various kinds of attacks. However, after analysis, the authors found their schemes each have some secure loopholes. In this paper, they...

    Provided By Nanhua University

  • White Papers // Aug 2011

    An Efficient RFID Mutual Authentication Scheme Based on ECC

    Recently, Radio Frequency IDentification (RFID) technique has been widely deployed in many applications, such as medical drugs management in hospitals and missing children searching in amusement parks. The applications basically can be classified into two types: non-Public Key Cryptosystem (PKC)-based and PKC-based. However, many of them have been found to...

    Provided By Nanhua University