Study on two privacy-oriented protocols for information communication systems

  • Authors:
  • Taek-Young Youn;Jongsung Kim;Myung-Jae Lim

  • Affiliations:
  • Electronics and Telecommunications Research Institute (ETRI), Daejeon, Korea;Division of e-Business, Kyungnam University, Masan, Changwon, Korea;Eulji University, Sujeong-gu, SeongNam-si, Korea

  • Venue:
  • Journal of Intelligent Manufacturing
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

In these days, the privacy of a user in information communication system is more important than ever before. Especially, the property is important for mobile communication systems due to the mobility of underlying mobile devices. Until now, many cryptographic tools have been proposed for achieving users' privacy. In this paper, we review two privacy-oriented cryptographic protocols, and show their security holes. We also provide some countermeasure to fix the weaknesses. First, we discuss the security of the user identification scheme proposed by Hsu and Chuang which permits a user to anonymously log into a system and establish a secret key shared with the system. We show that the Hsu-Chuang scheme is not secure against known session key attacks, and then we provide a countermeasure which can be used for enhancing the security the Hsu-Chuang scheme. Secondly, we review a deniable authentication proposed by Harn and Ren which protects the privacy of a message sender. Then we show that the protocol has a potential incompleteness and two weaknesses.