English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 93244/123616 (75%)
Visitors : 27848770      Online Users : 477
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 理學院 > 資訊科學系 > 會議論文 >  Item 140.119/112462
    Please use this identifier to cite or link to this item: http://nccur.lib.nccu.edu.tw/handle/140.119/112462

    Title: Security analysis of a NTRU-based mutual authentication scheme
    Authors: 左瑞麟
    Tso, Ray-Lin
    Jheng, Yi Shio
    Contributors: 資科系
    Keywords: Authentication;Global system for mobile communications;Near field communication;Security systems;Anonymous authentication;Eavesdropping attacks;Mobile payment;Mobile payment system;Mutual authentication;NTRU;security;Sensitive informations;Electronic money
    Date: 2016-10
    Issue Date: 2017-08-31 14:49:54 (UTC+8)
    Abstract: NFC-based mobile transaction has come into limelight in recent years thanks to the rapid development of NFC and mobile technologies. In these applications, the NFC-chip is in the card emulation mode to simulate a credit card. Because many sensitive information is exchanged during the communication of the mobile transaction, mutual authentication is required in order to verify the legality of each communicating party. Recently, Part and Lee introduced an anonymous authentication scheme based on NTRU. It is aimed to protect user information in NFC mobile payment systems without directly using private financial information of users. However, we found a security flaw in their new scheme. In this paper, we show that their scheme is insecure against an eavesdropping attack. An attacker, without any secret information, can impersonate the user against a service provider and pass the authentication procedure. This may result in a serious problem in which an attacker can enjoy a service such as an on-line shopping on behalf of the real user without the permission of the real user. An improved scheme will be left as our future work.
    Relation: 18th Asia-Pacific Network Operations and Management Symposium, APNOMS 2016: Management of Softwarized Infrastructure - Proceedings
    Data Type: conference
    DOI 連結: http://dx.doi.org/10.1109/APNOMS.2016.7737253
    DOI: 10.1109/APNOMS.2016.7737253
    Appears in Collections:[資訊科學系] 會議論文

    Files in This Item:

    File Description SizeFormat

    All items in 政大典藏 are protected by copyright, with all rights reserved.

    社群 sharing

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback