On the claimed privacy of EC-RAC III

In this paper we show how to break the most recent version of EC-RAC with respect to privacy. We show that both the ID-Transfer and ID&PWD-Transfer schemes from EC-RAC do not provide the claimed privacy levels by using a man-in-the-middle attack. The existence of these attacks voids the presente...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Fan, Junfeng, Hermans, Jens, Vercauteren, Fréderik
Format: Tagungsbericht
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 74
container_issue
container_start_page 66
container_title
container_volume 6370
creator Fan, Junfeng
Hermans, Jens
Vercauteren, Fréderik
description In this paper we show how to break the most recent version of EC-RAC with respect to privacy. We show that both the ID-Transfer and ID&PWD-Transfer schemes from EC-RAC do not provide the claimed privacy levels by using a man-in-the-middle attack. The existence of these attacks voids the presented privacy proofs for EC-RAC. © 2010 Springer-Verlag.
format Conference Proceeding
fullrecord <record><control><sourceid>kuleuven</sourceid><recordid>TN_cdi_kuleuven_dspace_123456789_324071</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>123456789_324071</sourcerecordid><originalsourceid>FETCH-kuleuven_dspace_123456789_3240713</originalsourceid><addsrcrecordid>eNpjZuAyNjMxMjSzMDI0ZmHgNDA2MNK1NDcx5mDgKi7OMjAwMDK3NOJkUPHPUyjJSFVIzknMzE1NUSgoyixLTK5UyE9TcHXWDXJ0VvD09ORhYE1LzClO5YXS3Azqbq4hzh662aU5qaVlqXnxKcUFicmp8YZGxiamZuYWlvHGRiYG5obGpKjUJk5lfElFiTEA7_88rw</addsrcrecordid><sourcetype>Institutional Repository</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>On the claimed privacy of EC-RAC III</title><source>Lirias (KU Leuven Association)</source><source>Springer Books</source><creator>Fan, Junfeng ; Hermans, Jens ; Vercauteren, Fréderik</creator><contributor>Yalcin, S.B.O</contributor><creatorcontrib>Fan, Junfeng ; Hermans, Jens ; Vercauteren, Fréderik ; Yalcin, S.B.O</creatorcontrib><description>In this paper we show how to break the most recent version of EC-RAC with respect to privacy. We show that both the ID-Transfer and ID&amp;PWD-Transfer schemes from EC-RAC do not provide the claimed privacy levels by using a man-in-the-middle attack. The existence of these attacks voids the presented privacy proofs for EC-RAC. © 2010 Springer-Verlag.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 3642168213</identifier><identifier>ISBN: 9783642168215</identifier><language>eng</language><publisher>Springer-Verlag</publisher><ispartof>Lecture Notes in Computer Science, 2010, Vol.6370, p.66-74</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,315,776,780,785,786,4036,4037,27837</link.rule.ids></links><search><contributor>Yalcin, S.B.O</contributor><creatorcontrib>Fan, Junfeng</creatorcontrib><creatorcontrib>Hermans, Jens</creatorcontrib><creatorcontrib>Vercauteren, Fréderik</creatorcontrib><title>On the claimed privacy of EC-RAC III</title><title>Lecture Notes in Computer Science</title><description>In this paper we show how to break the most recent version of EC-RAC with respect to privacy. We show that both the ID-Transfer and ID&amp;PWD-Transfer schemes from EC-RAC do not provide the claimed privacy levels by using a man-in-the-middle attack. The existence of these attacks voids the presented privacy proofs for EC-RAC. © 2010 Springer-Verlag.</description><issn>0302-9743</issn><isbn>3642168213</isbn><isbn>9783642168215</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>FZOIL</sourceid><recordid>eNpjZuAyNjMxMjSzMDI0ZmHgNDA2MNK1NDcx5mDgKi7OMjAwMDK3NOJkUPHPUyjJSFVIzknMzE1NUSgoyixLTK5UyE9TcHXWDXJ0VvD09ORhYE1LzClO5YXS3Azqbq4hzh662aU5qaVlqXnxKcUFicmp8YZGxiamZuYWlvHGRiYG5obGpKjUJk5lfElFiTEA7_88rw</recordid><startdate>2010</startdate><enddate>2010</enddate><creator>Fan, Junfeng</creator><creator>Hermans, Jens</creator><creator>Vercauteren, Fréderik</creator><general>Springer-Verlag</general><scope>FZOIL</scope></search><sort><creationdate>2010</creationdate><title>On the claimed privacy of EC-RAC III</title><author>Fan, Junfeng ; Hermans, Jens ; Vercauteren, Fréderik</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-kuleuven_dspace_123456789_3240713</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Fan, Junfeng</creatorcontrib><creatorcontrib>Hermans, Jens</creatorcontrib><creatorcontrib>Vercauteren, Fréderik</creatorcontrib><collection>Lirias (KU Leuven Association)</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Fan, Junfeng</au><au>Hermans, Jens</au><au>Vercauteren, Fréderik</au><au>Yalcin, S.B.O</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>On the claimed privacy of EC-RAC III</atitle><btitle>Lecture Notes in Computer Science</btitle><date>2010</date><risdate>2010</risdate><volume>6370</volume><spage>66</spage><epage>74</epage><pages>66-74</pages><issn>0302-9743</issn><isbn>3642168213</isbn><isbn>9783642168215</isbn><abstract>In this paper we show how to break the most recent version of EC-RAC with respect to privacy. We show that both the ID-Transfer and ID&amp;PWD-Transfer schemes from EC-RAC do not provide the claimed privacy levels by using a man-in-the-middle attack. The existence of these attacks voids the presented privacy proofs for EC-RAC. © 2010 Springer-Verlag.</abstract><pub>Springer-Verlag</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture Notes in Computer Science, 2010, Vol.6370, p.66-74
issn 0302-9743
language eng
recordid cdi_kuleuven_dspace_123456789_324071
source Lirias (KU Leuven Association); Springer Books
title On the claimed privacy of EC-RAC III
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T13%3A36%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-kuleuven&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=On%20the%20claimed%20privacy%20of%20EC-RAC%20III&rft.btitle=Lecture%20Notes%20in%20Computer%20Science&rft.au=Fan,%20Junfeng&rft.date=2010&rft.volume=6370&rft.spage=66&rft.epage=74&rft.pages=66-74&rft.issn=0302-9743&rft.isbn=3642168213&rft.isbn_list=9783642168215&rft_id=info:doi/&rft_dat=%3Ckuleuven%3E123456789_324071%3C/kuleuven%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true