The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Kiyomoto-Fukushima-Tanaka a proposé un système d'authentification d'attributs parfaitement anonyme qui réalise une authentification non identifiable et introuvable avec vérification de révocation hors ligne. Le système Kiyomoto-Fukushima-Tanaka utilise un certificat auto-blindable qu'un utilisateur peut modifier de manière aléatoire. Ainsi, le certificat est modifié à chaque authentification et le schéma d'authentification possède la propriété non identifiable et la propriété introuvable. Cependant, dans cette lettre, nous montrons que le projet Kiyomoto-Fukushima-Tanaka n’est pas sécurisé contre l’usurpation d’identité.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Haeryong PARK, "Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme" in IEICE TRANSACTIONS on Communications,
vol. E92-B, no. 9, pp. 2946-2947, September 2009, doi: 10.1587/transcom.E92.B.2946.
Abstract: Kiyomoto-Fukushima-Tanaka proposed a perfectly anonymous attribute authentication scheme that realizes unidentifiable and untraceable authentication with offline revocation checking. The Kiyomoto-Fukushima-Tanaka scheme uses a self-blindable certificate that a user can change randomly. Thus, the certificate is modified for each authentication and the authentication scheme has the unidentifiable property and the untraceable property. However, in this letter, we show that the Kiyomoto-Fukushima-Tanaka scheme is insecure against the impersonation attack.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E92.B.2946/_p
Copier
@ARTICLE{e92-b_9_2946,
author={Haeryong PARK, },
journal={IEICE TRANSACTIONS on Communications},
title={Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme},
year={2009},
volume={E92-B},
number={9},
pages={2946-2947},
abstract={Kiyomoto-Fukushima-Tanaka proposed a perfectly anonymous attribute authentication scheme that realizes unidentifiable and untraceable authentication with offline revocation checking. The Kiyomoto-Fukushima-Tanaka scheme uses a self-blindable certificate that a user can change randomly. Thus, the certificate is modified for each authentication and the authentication scheme has the unidentifiable property and the untraceable property. However, in this letter, we show that the Kiyomoto-Fukushima-Tanaka scheme is insecure against the impersonation attack.},
keywords={},
doi={10.1587/transcom.E92.B.2946},
ISSN={1745-1345},
month={September},}
Copier
TY - JOUR
TI - Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme
T2 - IEICE TRANSACTIONS on Communications
SP - 2946
EP - 2947
AU - Haeryong PARK
PY - 2009
DO - 10.1587/transcom.E92.B.2946
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E92-B
IS - 9
JA - IEICE TRANSACTIONS on Communications
Y1 - September 2009
AB - Kiyomoto-Fukushima-Tanaka proposed a perfectly anonymous attribute authentication scheme that realizes unidentifiable and untraceable authentication with offline revocation checking. The Kiyomoto-Fukushima-Tanaka scheme uses a self-blindable certificate that a user can change randomly. Thus, the certificate is modified for each authentication and the authentication scheme has the unidentifiable property and the untraceable property. However, in this letter, we show that the Kiyomoto-Fukushima-Tanaka scheme is insecure against the impersonation attack.
ER -