Welcome to the resource topic for 2010/165
Title:
Comment on four two-party authentication protocols
Authors: Yalin Chen, Jue-Sam Chou, Chun-Hui Huang
Abstract:In this paper, we analyze the protocols of Bindu et al., Goriparthi et al., Wang et al. and Hölbl et al… After analyses, we found that Bindu et al.’s protocol suffers from the insider attack if the smart card is lost, both Goriparthi et al.’s and Wang et al.’s protocols can’t withstand the DoS attack on the password change phase which makes the password invalid after the protocol run, and Hölbl et al.’s protocol is vulnerable to the insider attack since a malevolent legal user can deduce KGC’s secret key xs.
ePrint: https://eprint.iacr.org/2010/165
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .