ABSTRACT In 2008, Cao et al. proposed an identity-based multi-user broadcast authentication scheme (called IMBAS) for wireless sensor networks."/>

Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks.

SECURITY AND COMMUNICATION NETWORKS(2013)

引用 4|浏览8
暂无评分
摘要
ABSTRACT In 2008, Cao et al. proposed an identity-based multi-user broadcast authentication scheme (called IMBAS) for wireless sensor networks. The IMBAS consists of one elliptic curve-based signature scheme, called variant of Bellare-Namprempre-Neven' Identity-Based Signature (vBNN-IBS), for user broadcast authentication; a new Schnorr signature with partial message recovery for sink broadcast authentication; and a password-based private key protection to eliminate the threat caused by possible user device compromise. Compared with its counterparts, IMBAS owns better performance in terms of security, scalability, and efficiency. Unfortunately, this letter will show that (1) the password-based protection scheme and the vBNN-IBS scheme are not securea compromised user device will disclose the user private keyand (2) the new Schnorr signature with partial message recovery is vulnerable to existential forgery attack. Copyright (c) 2012 John Wiley & Sons, Ltd.</div><span class="a-aminer-core-pub-c-paper-abstract-morebtn"><span>更多</span></span></div></div><div class="a-aminer-core-pub-c-paper-abstract-tranText">查看译文</div></div></div></div></span></div></div><div class="a-aminer-core-pub-index-titleBox"><div class="a-aminer-core-pub-index-keyTitle">关键词</div><div class="a-aminer-core-pub-index-titleKeys"><span>broadcast authentication<!-- -->,</span><span>wireless sensor networks<!-- -->,</span><span>elliptic curve cryptography<!-- -->,</span><span>password based<!-- -->,</span><span>existential forgery attack</span></div></div></div><div class="background" style="margin-top:16px;margin-bottom:16px" id="summary"><div class="mainTitle"><span>AI 理解论文</span></div><div><div class="stitle" style="margin-top:16px;margin-bottom:16px"><span>溯源树</span></div><div class="a-aminer-core-pub-index-renderTree"><div class="a-aminer-core-pub-index-example"><div class="a-aminer-core-pub-index-topExampleText"><span>样例</span></div><img src="https://originalfileserver.aminer.cn/sys/aminer/pubs/mrt_preview.jpeg" alt=""/></div><div class="a-aminer-core-pub-index-layer"></div><div class="a-aminer-core-pub-index-pdfLoad"><div class="a-aminer-core-pub-index-pdfLoad_text"><span style="margin-right:24px"><svg class="icon" aria-hidden="true"><use xlink:href="#icon-suyuansu"></use></svg></span><span>生成溯源树,研究论文发展脉络</span></div></div></div></div></div></section><div><div class=""><section class="a-aminer-core-pub-index-rightBar"><div class="a-aminer-core-pub-index-commented "><div class="a-aminer-core-pub-index-bg"></div><div class="a-aminer-core-pub-index-title">Chat Paper</div><div class="a-core-home2-c-card-person-bottom-card-new-summary-index-summaryBox a-core-home2-c-card-person-bottom-card-new-summary-index-pubBox"><div class="a-core-home2-c-card-person-bottom-card-new-summary-index-loadingBox"><span class="a-core-home2-c-card-person-bottom-card-new-summary-index-loadingText">正在生成论文摘要</span><div class="ant-spin ant-spin-spinning"><i aria-label="icon: loading" style="font-size:24px" class="anticon anticon-loading ant-spin-dot"><svg viewBox="0 0 1024 1024" focusable="false" class="anticon-spin" data-icon="loading" width="1em" height="1em" fill="currentColor" aria-hidden="true"><path d="M988 548c-19.9 0-36-16.1-36-36 0-59.4-11.6-117-34.6-171.3a440.45 440.45 0 0 0-94.3-139.9 437.71 437.71 0 0 0-139.9-94.3C629 83.6 571.4 72 512 72c-19.9 0-36-16.1-36-36s16.1-36 36-36c69.1 0 136.2 13.5 199.3 40.3C772.3 66 827 103 874 150c47 47 83.9 101.8 109.7 162.7 26.7 63.1 40.2 130.2 40.2 199.3.1 19.9-16 36-35.9 36z"></path></svg></i></div></div></div></div></section></div></div></article></main></main></section></div> <script> window.g_useSSR = true; window.g_initialProps = {"global":{"collapsed":false,"preventRender":false,"isCompanyIp":false},"pub":{"paper":{"abstract":"\u003Ctitle content-type=\"main\"\u003EABSTRACT In 2008, Cao et al. proposed an identity-based multi-user broadcast authentication scheme (called IMBAS) for wireless sensor networks. The IMBAS consists of one elliptic curve-based signature scheme, called variant of Bellare-Namprempre-Neven' Identity-Based Signature (vBNN-IBS), for user broadcast authentication; a new Schnorr signature with partial message recovery for sink broadcast authentication; and a password-based private key protection to eliminate the threat caused by possible user device compromise. Compared with its counterparts, IMBAS owns better performance in terms of security, scalability, and efficiency. Unfortunately, this letter will show that (1) the password-based protection scheme and the vBNN-IBS scheme are not securea compromised user device will disclose the user private keyand (2) the new Schnorr signature with partial message recovery is vulnerable to existential forgery attack. Copyright (c) 2012 John Wiley & Sons, Ltd.","abstract_zh":"","authors":[{"id":"53f46c9edabfaee43ed0f5e3","name":"Hung-Yu Chien","org":"Natl Chi Nan Univ, Dept Informat Management, Puli 470, Nantou, Taiwan","orgid":"5f71b2aa1c455f439fe3d5b4"},{"id":"6424b2b504e94800017552c7","name":"Chin-I Lee","org":"Ling Tung Univ, Dept Informat Management, Taichung, Taiwan","orgid":"5f71b3e11c455f439fe46068"},{"id":"54057a8bdabfae92b41d91ff","name":"Tzong-Chen Wu","org":"Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan"}],"doi":"10.1002\u002Fsec.649","id":"53e9ae1cb7602d970382f81c","is_downvoted":false,"is_starring":false,"is_upvoted":false,"issn":"1939-0114","keywords":["broadcast authentication","wireless sensor networks","elliptic curve cryptography","password based","existential forgery attack"],"labels":["en_journal"],"lang":"en","num_citation":4,"num_starred":0,"num_upvoted":0,"num_viewed":8,"pages":{"end":"998.0","start":"993.0"},"title":"Comments on IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks.","urls":["https:\u002F\u002Fopenalex.org\u002FW1937614463","https:\u002F\u002Fdoi.org\u002F10.1002\u002Fsec.649","http:\u002F\u002Fdx.doi.org\u002F10.1002\u002Fsec.649","http:\u002F\u002Fwww.webofknowledge.com\u002F"],"venue":{"info":{"name":"SECURITY AND COMMUNICATION NETWORKS"},"issue":"8","volume":"6"},"venue_hhb_id":"5ea1aa56edb6e7d53c00bba6","versions":[{"id":"599c7878601a182cd25cb23f","sid":"journals\u002Fscn\u002FChienLW13","src":"dblp","vsid":"journals\u002Fscn","year":2013},{"id":"56d9033ddabfae2eeee57c42","sid":"1937614463","src":"mag","year":2013},{"id":"5ff599d2bf33bee3bae81f75","sid":"WOS:000321548600009","src":"wos","vsid":"SECURITY AND COMMUNICATION NETWORKS","year":2013},{"id":"6228eb785aee126c0f2af987","sid":"W1937614463","src":"openalex"},{"id":"6228eb785aee126c0f2af987","sid":"W1937614463","src":"openalex","vsid":"SECURITY AND COMMUNICATION NETWORKS","year":2013},{"id":"62179c985aee126c0f86ff92","sid":"10.1002\u002Fsec.649","src":"crossref","vsid":"SECURITY AND COMMUNICATION NETWORKS","year":2013}],"year":2013},"authorsData":[{"id":"53f46c9edabfaee43ed0f5e3","name":"Hung-Yu Chien","org":"Natl Chi Nan Univ, Dept Informat Management, Puli 470, Nantou, Taiwan","orgid":"5f71b2aa1c455f439fe3d5b4"},{"id":"6424b2b504e94800017552c7","name":"Chin-I Lee","org":"Ling Tung Univ, Dept Informat Management, Taichung, Taiwan","orgid":"5f71b3e11c455f439fe46068"},{"id":"54057a8bdabfae92b41d91ff","name":"Tzong-Chen Wu","org":"Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan"}]}}; </script> <script src="https://fileserver.aminer.cn/lib/react-latest/react.production.min.js"></script> <script src="https://fileserver.aminer.cn/lib/react-latest/react-dom.production.min.js"></script> <script>window.__webpack_public_path__ = '/public/';</script><script src="//ssr.aminer.cn/public/umi.116a55fd.js"></script> <script src="https://hm.baidu.com/hm.js?dc703135c31ddfba7bcda2d15caab04e"></script> <script src="https://hm.baidu.com/hm.js?789fd650fa0be6a2a064d019d890b87f"></script> <script src="https://hm.baidu.com/hm.js?6b029ce1079ea4976b430cc9965724db"></script> <!-- <script src="https://fileserver.aminer.cn/misc/collect.min.js"></script> --> <script src="https://fileserver.aminer.cn/misc/collect.min.nano.update.js"></script> <!-- GIO --> <script> var _vds = _vds || []; window._vds = _vds; (function () { _vds.push(['setAccountId', 'ae8dfb99e5e4cda1']); (function () { var vds = document.createElement('script'); vds.type = 'text/javascript'; vds.async = true; vds.src = ('https:' == document.location.protocol ? 'https://' : 'http://') + 'assets.giocdn.com/vds.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(vds, s); })(); })(); </script> </body></html>