Forgery Attack to Authentication of Anycast Communication

Article Preview

Abstract:

Al-Ibrahim and Cerny proposed an authentication scheme of anycast communication. Their scheme is based on El-Gamal type signature scheme. We prove that their preferred scheme, which does not require interaction among the various signers, is insecure.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2483-2486

Citation:

Online since:

June 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Al-Ibrahim and A. Cern´y: Authentication of Anycast communication. in MMM-ACNS (2003), p.419–423.

Google Scholar

[2] C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology (1991), Vol. 4, p.161–174.

DOI: 10.1007/bf00196725

Google Scholar

[3] K. Zhang: Threshold proxy signature schemes. Proceedings of the First International Workshop on Information Security (1997), p.282–290.

Google Scholar

[4] H. Ghodosi and J. Pieprzyk: Repudiation of cheating and non-repudiation of Zhangs proxy signature schemes. in Information Security and Privacy (J. Pieprzyk, R. Safavi-Naini, and J. Seberry, eds. ). Lecture Notes in Computer Science (1999).

DOI: 10.1007/3-540-48970-3_11

Google Scholar

[5] K. U. M. Mambo and E. Okamoto: Proxy signature-delegation of the power to sign message. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences. (1996). Vol. E79-A, p.1338–1354.

Google Scholar

[6] Wikipedia, Anycast scheme., Wikipedia website, 2010. http: /en. wikipedia. org/wiki/Anycast.

Google Scholar