CryptoDB
Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme
Authors: | |
---|---|
Download: | |
Abstract: | In this paper we analyse an anonymous wireless authentication and conference key distribution scheme which is also designed to provide mobile participants with user identification privacy during the conference call. The proposed scheme consists of three sub-protocols: the Call Set-Up Authentication Protocol, the Hand-Off Authentication Protocol, and the Anonymous Conference Call Protocol. We show that the proposed scheme suffers from a number of security vulnerabilities. |
BibTeX
@misc{eprint-2005-12384, title={Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme}, booktitle={IACR Eprint archive}, keywords={cryptographic protocols / wireless authentication, key agreement}, url={http://eprint.iacr.org/2005/047}, note={ qiang.tang@rhul.ac.uk 12833 received 19 Feb 2005}, author={Qiang Tang and Chris J. Mitchell}, year=2005 }