Security Analysis of Authentication Schemes Recently Proposed in Literature. Based on weaknesses in the registration phase and key generation in [10], as also discussed later, Chen et al. [11] proposed a slightly different scheme. We argue that both schemes do not offer the required strength in the CK security model. In addition, we also describe some more practical issues with the registration phase in [10] and the resistance against DoS attacks. This last type of attack is also applicable for the scheme of [11].
Appears in 3 contracts
Samples: Key Agreement, Key Agreement, Key Agreement
Security Analysis of Authentication Schemes Recently Proposed in Literature. Based on weaknesses in the registration phase and key generation in [10], as also discussed later, Chen Xxxx et al. [11] proposed a slightly different scheme. We argue that both schemes do not offer the required strength in the CK security model. In addition, we also describe some more practical issues with the registration phase in [10] and the resistance against DoS attacks. This last type of attack is also applicable for the scheme of [11].
Appears in 1 contract
Samples: Open Access License