Title
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions"
Abstract
Usually the main primitive in building a secure wireless authentication is a cryptographic algorithm, such as digital signature scheme. He et al. proposed a handover authentication protocol in [1] (IEEE Trans. Wireless Commun., vol. 11, no. 1, 2011) and a distributed reprogramming protocol in [3] (IEEE Trans. Ind. Electron., vol. 59, no. 11, 2012) for wireless networks. Both protocols are based on an identity-based signature scheme which is claimed to be secure yet efficient. Very recently, He et al. pointed out that such a signature scheme is vulnerable to the key compromised problem. They proposed a simple modification to fix this problem without losing the efficiency and security of the scheme in both [2] (IEEE Commun. Lett., vol. 16, no. 8, 2012) and [4] (IEEE Trans. Ind. Electron., to appear). In this letter, we show that the proposed modification remains vulnerable to the key compromised problem.
Year
DOI
Venue
2013
10.1109/LCOMM.2013.052013.130642
IEEE Communications Letters
Keywords
Field
DocType
Protocols,Authentication,Handover,Cryptography,Wireless sensor networks
Wireless network,Authentication,Cryptographic protocol,Computer science,Cryptography,Computer network,Digital signature,Authentication protocol,IEEE 802.11r-2008,Handover
Journal
Volume
Issue
ISSN
17
8
1089-7798
Citations 
PageRank 
References 
14
0.66
5
Authors
4
Name
Order
Citations
PageRank
Sze Ling Yeo1408.76
Wun-She Yap210517.55
Joseph K. Liu3113467.24
Matt Henricksen413113.55