Comments on 'Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions'

Sze Ling Yeo, Wun-She Yap, Kai Sui Joseph Liu, Matt Henricksen

Research output: Contribution to journalArticleResearchpeer-review

24 Citations (Scopus)

Abstract

Usually the main primitive in building a secure wireless authentication is a cryptographic algorithm, such as digital signature scheme. He et al. proposed a handover authentication protocol in (IEEE Trans. Wireless Commun., vol. 11, no. 1, 2011) and a distributed reprogramming protocol in (IEEE Trans. Ind. Electron., vol. 59, no. 11, 2012) for wireless networks. Both protocols are based on an identity-based signature scheme which is claimed to be secure yet efficient. Very recently, He et al. pointed out that such a signature scheme is vulnerable to the key compromised problem. They proposed a simple modification to fix this problem without losing the efficiency and security of the scheme in both (IEEE Commun. Lett., vol. 16, no. 8, 2012) and (IEEE Trans. Ind. Electron., to appear). In this letter, we show that the proposed modification remains vulnerable to the key compromised problem.
Original languageEnglish
Pages (from-to)1521 - 1523
Number of pages3
JournalIEEE Communications Letters
Volume17
Issue number8
DOIs
Publication statusPublished - 2013
Externally publishedYes

Cite this

@article{2d080080fe1d4071a9d432deef3baba7,
title = "Comments on 'Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions'",
abstract = "Usually the main primitive in building a secure wireless authentication is a cryptographic algorithm, such as digital signature scheme. He et al. proposed a handover authentication protocol in (IEEE Trans. Wireless Commun., vol. 11, no. 1, 2011) and a distributed reprogramming protocol in (IEEE Trans. Ind. Electron., vol. 59, no. 11, 2012) for wireless networks. Both protocols are based on an identity-based signature scheme which is claimed to be secure yet efficient. Very recently, He et al. pointed out that such a signature scheme is vulnerable to the key compromised problem. They proposed a simple modification to fix this problem without losing the efficiency and security of the scheme in both (IEEE Commun. Lett., vol. 16, no. 8, 2012) and (IEEE Trans. Ind. Electron., to appear). In this letter, we show that the proposed modification remains vulnerable to the key compromised problem.",
author = "Yeo, {Sze Ling} and Wun-She Yap and Liu, {Kai Sui Joseph} and Matt Henricksen",
year = "2013",
doi = "10.1109/LCOMM.2013.052013.130642",
language = "English",
volume = "17",
pages = "1521 -- 1523",
journal = "IEEE Communications Letters",
issn = "1089-7798",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
number = "8",

}

Comments on 'Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions'. / Yeo, Sze Ling; Yap, Wun-She; Liu, Kai Sui Joseph; Henricksen, Matt.

In: IEEE Communications Letters, Vol. 17, No. 8, 2013, p. 1521 - 1523.

Research output: Contribution to journalArticleResearchpeer-review

TY - JOUR

T1 - Comments on 'Analysis and improvement of a secure and efficient handover authentication based on bilinear pairing functions'

AU - Yeo, Sze Ling

AU - Yap, Wun-She

AU - Liu, Kai Sui Joseph

AU - Henricksen, Matt

PY - 2013

Y1 - 2013

N2 - Usually the main primitive in building a secure wireless authentication is a cryptographic algorithm, such as digital signature scheme. He et al. proposed a handover authentication protocol in (IEEE Trans. Wireless Commun., vol. 11, no. 1, 2011) and a distributed reprogramming protocol in (IEEE Trans. Ind. Electron., vol. 59, no. 11, 2012) for wireless networks. Both protocols are based on an identity-based signature scheme which is claimed to be secure yet efficient. Very recently, He et al. pointed out that such a signature scheme is vulnerable to the key compromised problem. They proposed a simple modification to fix this problem without losing the efficiency and security of the scheme in both (IEEE Commun. Lett., vol. 16, no. 8, 2012) and (IEEE Trans. Ind. Electron., to appear). In this letter, we show that the proposed modification remains vulnerable to the key compromised problem.

AB - Usually the main primitive in building a secure wireless authentication is a cryptographic algorithm, such as digital signature scheme. He et al. proposed a handover authentication protocol in (IEEE Trans. Wireless Commun., vol. 11, no. 1, 2011) and a distributed reprogramming protocol in (IEEE Trans. Ind. Electron., vol. 59, no. 11, 2012) for wireless networks. Both protocols are based on an identity-based signature scheme which is claimed to be secure yet efficient. Very recently, He et al. pointed out that such a signature scheme is vulnerable to the key compromised problem. They proposed a simple modification to fix this problem without losing the efficiency and security of the scheme in both (IEEE Commun. Lett., vol. 16, no. 8, 2012) and (IEEE Trans. Ind. Electron., to appear). In this letter, we show that the proposed modification remains vulnerable to the key compromised problem.

UR - http://ieeexplore.ieee.org.ezproxy.lib.monash.edu.au/stamp/stamp.jsp?tp=&arnumber=6519415

U2 - 10.1109/LCOMM.2013.052013.130642

DO - 10.1109/LCOMM.2013.052013.130642

M3 - Article

VL - 17

SP - 1521

EP - 1523

JO - IEEE Communications Letters

JF - IEEE Communications Letters

SN - 1089-7798

IS - 8

ER -