Kiyomoto-Fukushima-Tanaka proposed a perfectly anonymous attribute authentication scheme that realizes unidentifiable and untraceable authentication with offline revocation checking. The Kiyomoto-Fukushima-Tanaka scheme uses a self-blindable certificate that a user can change randomly. Thus, the certificate is modified for each authentication and the authentication scheme has the unidentifiable property and the untraceable property. However, in this letter, we show that the Kiyomoto-Fukushima-Tanaka scheme is insecure against the impersonation attack.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Haeryong PARK, "Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme" in IEICE TRANSACTIONS on Communications,
vol. E92-B, no. 9, pp. 2946-2947, September 2009, doi: 10.1587/transcom.E92.B.2946.
Abstract: Kiyomoto-Fukushima-Tanaka proposed a perfectly anonymous attribute authentication scheme that realizes unidentifiable and untraceable authentication with offline revocation checking. The Kiyomoto-Fukushima-Tanaka scheme uses a self-blindable certificate that a user can change randomly. Thus, the certificate is modified for each authentication and the authentication scheme has the unidentifiable property and the untraceable property. However, in this letter, we show that the Kiyomoto-Fukushima-Tanaka scheme is insecure against the impersonation attack.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E92.B.2946/_p
Copy
@ARTICLE{e92-b_9_2946,
author={Haeryong PARK, },
journal={IEICE TRANSACTIONS on Communications},
title={Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme},
year={2009},
volume={E92-B},
number={9},
pages={2946-2947},
abstract={Kiyomoto-Fukushima-Tanaka proposed a perfectly anonymous attribute authentication scheme that realizes unidentifiable and untraceable authentication with offline revocation checking. The Kiyomoto-Fukushima-Tanaka scheme uses a self-blindable certificate that a user can change randomly. Thus, the certificate is modified for each authentication and the authentication scheme has the unidentifiable property and the untraceable property. However, in this letter, we show that the Kiyomoto-Fukushima-Tanaka scheme is insecure against the impersonation attack.},
keywords={},
doi={10.1587/transcom.E92.B.2946},
ISSN={1745-1345},
month={September},}
Copy
TY - JOUR
TI - Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme
T2 - IEICE TRANSACTIONS on Communications
SP - 2946
EP - 2947
AU - Haeryong PARK
PY - 2009
DO - 10.1587/transcom.E92.B.2946
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E92-B
IS - 9
JA - IEICE TRANSACTIONS on Communications
Y1 - September 2009
AB - Kiyomoto-Fukushima-Tanaka proposed a perfectly anonymous attribute authentication scheme that realizes unidentifiable and untraceable authentication with offline revocation checking. The Kiyomoto-Fukushima-Tanaka scheme uses a self-blindable certificate that a user can change randomly. Thus, the certificate is modified for each authentication and the authentication scheme has the unidentifiable property and the untraceable property. However, in this letter, we show that the Kiyomoto-Fukushima-Tanaka scheme is insecure against the impersonation attack.
ER -