Browse > Article
http://dx.doi.org/10.12673/jant.2011.15.4.664

A Study on the Analysis of Authentication and ID-based key Management Protocol in Online Game Environment  

Lee, Yang-Sun (Dept. of Information Communication Eng., Chosun University)
Park, Sang-Oh (Dept. of Computer Eng., Chung-Ang University)
Abstract
The development of IT technology and breakthrough of the network and the wired network, wireless network boundaries disappear and wired and wireless integrated service environment is the advent in online game environment. However, the wired and wireless integrated service environment appropriate security technology is still inactive, wired and wireless integration environment due to the characteristic as well as security threats wired network and security threats in wireless networks should be considered. Therefore, This wired and wireless integrated environment has been considering studied various, Among them wired and wireless environment considering the lightweight of ID-based authentication and key management has been in progress. In recent, Moon et al. pervasive environment in authentication and ID-based key management protocol is proposed. However, Moon et al.'s scheme is use the ID-based public-key approach to decreased the amount of computation. However, pairing by using a technique similar to the existing public key scheme can represent the amount of computation. Therefore, In this paper the way of Moon etc in security vulnerability analysis.
Keywords
ID-Based; Authentication; Key Management;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Jong Sik Moon, Deok Gyu Lee, Jong Hyuk Park, Im Yeong Lee, "Authentication and ID-Based Key Management Protocol in Pervasive Environment," WIRELESS PERSONAL COMMUNICATIONS, 2009.08. (Online Pullished)
2 A. Shamir, "Identity-based cryptosystems and signature schemes," CRYPTO''84, pp. 47-53, 1984.
3 김경신, "효율적인 ID기반 강한 검증자 지정 서명 기법," 고려대학교 정보경영공학전문대학원 석사졸업논문 2010.
4 Jiang, J., He, C., and Jiang, L. G., "On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access," ICCNMC, pp. 972-981, 2005.
5 이원진, 김은주, 전일수, "스마트카드를 이용한 ID기반의 사용자 인증 프로토콜," 한국컴퓨터종합학술대회, Vol. 32, No. 1, pp. 166-168, 2005.
6 Wang, H., Yao, G., and Jiang, Q., "An identity-based group key agreement protocol from pairing," The 2008 Third International Conference on Availability, Reliability, Security (ARES), pp. 532-537, 2008.
7 Wang, S., Cao, Z., Choo, K.-K. R., and Wang, L. "An improved identity-based key agreement protocol and its security proof," ISCI, 179(3), pp. 307-318, 2009.
8 M.Scott, "Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints," IACR e-print archive, 2004.
9 J.P. Jeong, M. Y. Chung and H.S. Choo, "Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks," HICSS, pp. 294, 2008.
10 H.J. Bae, H.S. Kim, K.Y. Yoo, "ID-based key exchange protocol using smart cards," Korea Computer Congress 30(1), pp.l 491-493, 2003.
11 S.U. Lee, "ID-based Wireless LAN Authentication Technique Between Terminals," Kyungpook National University Graduate School, 2004.
12 H.S. Kim, S.W. Lee, K.Y. Yoo, "ID-based password authentication scheme using smart cards and fingerprints," ACM Operating Systems Review 37(4), pp. 32-41, 2003.   DOI   ScienceOn
13 J.K. Lee, S.R. Ryu, K.Y. Yoo, "Fingerprint-based remote user authentication scheme using smart cards," Electronics Letters 38(12), pp. 554-555, 2002.   DOI   ScienceOn