Efficient anonymous channel and all/nothing election scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
A Wireless-based Authentication and Anonymous Channels for Large Scale Area
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
Anonymous authentication scheme for wireless communications
International Journal of Mobile Communications
Low-Complexity authentication scheme based on cellular automata in wireless network
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Privacy and authentication protocol providing anonymous channels in GSM
Computer Communications
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
The authentication and anonymous channel protocol for large-scale area in wireless communications proposed in [Proc. Sixth IEEE Symposium on Computers and Communications (ISCC'01), 3-5 (2001) 36] by Lin-Jan is analyzed, proving that it is not secure. More precisely, fake anonymous channel tickets can be easily generated allowing nonauthorized users to be validated by the Visiting Network. Unlike it was claimed in [Proc. Sixth IEEE Symposium on Computers and Communications (ISCC'01), 3-5 (2001) 36], the security of this protocol does not rely on the difficulty of computing discrete logarithms over the finite field GF(p), p being a prime.