Title :
On the anonymity of some authentication schemes for wireless communications
Author :
Zeng, Peng ; Cao, Zhenfu ; Choo, Kim-Kwang Raymond ; Wang, Shengbao
Author_Institution :
Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai
fDate :
3/1/2009 12:00:00 AM
Abstract :
In 2004, Zhu and Ma proposed a new and efficient authentication scheme claiming to provide anonymity for wireless environments. Two years later, Lee et al. revealed several previously unpublished flaws in Zhu-Ma´s authentication scheme and proposed a fix. More recently in 2008, Wu et al. pointed out that Lee et al.´s proposed fix fails to preserve anonymity as claimed and then proposed yet another fix to address the problem. In this paper, we use Wu et al.´s scheme as a case study and demonstrate that due to an inherent design flaw in Zhu-Ma´s scheme, the latter and its successors are unlikely to provide anonymity. We hope that by identifying this design flaw, similar structural mistakes can be avoided in future designs.
Keywords :
mobile communication; telecommunication security; Zhu-Ma scheme design flaw; anonymity; authentication schemes; wireless communications; Australia; Authentication; Communications technology; Computer science; Cryptography; History; Identity-based encryption; Military communication; Privacy; Wireless communication; Anonymity; authentication; wireless communications;
Journal_Title :
Communications Letters, IEEE
DOI :
10.1109/LCOMM.2009.081821