Paper 2023/1629
A Note on ``A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0''
Abstract
We show that the Xu et al.'s authentication and key agreement scheme [IEEE Trans. Ind. Informatics, 18(10), 7118-7127, 2022] is flawed. (1) It confused some operations for bilinear maps and presented some inconsistent computations. (2) It failed to keep anonymity, not as claimed. The adversary can use any device's public key stored in the blockchain to test some verification equations so as to reveal the identity of a target device.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Key agreementanonymityauthenticationblockchain
- Contact author(s)
-
caozhj @ shu edu cn
liulh @ shmtu edu cn - History
- 2023-10-23: approved
- 2023-10-20: received
- See all versions
- Short URL
- https://ia.cr/2023/1629
- License
-
CC0
BibTeX
@misc{cryptoeprint:2023/1629, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on ``A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0''}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/1629}, year = {2023}, url = {https://eprint.iacr.org/2023/1629} }