On Security of Privacy-Preserving Remote User Authentication with K-Times Untraceability

被引:0
|
作者
Zhang, Qijia [1 ]
Zhang, Jianhong [1 ,2 ]
Liu, Linhan [1 ]
Wang, Jing [3 ]
Liu, Pei [3 ]
机构
[1] School of Information Sciences and Technology, North China University of Technology, Beijing,100144, China
[2] GuiZhou University, Guizhou Provincial Key Laboratory of Public Big Data, Guizhou Guiyang,550025, China
[3] Beijing Jingdong Century Information Technology Company, Beijing,100100, China
关键词
Privacy-preserving techniques;
D O I
10.6633/IJNS.20210523(3).09
中图分类号
学科分类号
摘要
As an important access control technique, k-times anonymous authentication (k-TAA) plays a vital role in ecoupon and e-bill. It allows a user to anonymously authenticate himself to a remote server a bounded number of times. However, most of the existing k-TAA schemes require heavy computation, which brings a challenge to resource-limited devices. In 2018, Tian et al. proposed a privacy-preserving remote user authentication with k-times untraceability. Unlike the traditional k-TAA schemes, Tian et al.'s is more suitable for mobile devices due to avoiding expensive pairing operations. And they claim that their scheme provides user authenticity and k-times untraceability. Unfortunately, in this paper, we find that their scheme is insecure by analyzing it. Their scheme can neither prevent a malicious user from passing the authentication nor trace the identity of a dishonest user authenticating for more than k times. Finally, the corresponding attacks are given. © 2021. All Rights Reserved
引用
收藏
页码:449 / 454
相关论文
共 50 条
  • [41] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    [J]. SN Computer Science, 4 (5)
  • [42] Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
    Wang, Chenyu
    Wang, Ding
    Xu, Guoai
    He, Debiao
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [43] Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
    Hernandez-alvarez, Luis
    Maria de Fuentes, Jose
    Gonzalez-Manzano, Lorena
    Hernandez Encinas, Luis
    [J]. SENSORS, 2021, 21 (01) : 1 - 23
  • [44] A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
    R. Shashidhara
    Sriramulu Bojjagani
    Anup Kumar Maurya
    Saru Kumari
    Hu Xiong
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 1943 - 1966
  • [45] Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
    Chenyu Wang
    Ding Wang
    Guoai Xu
    Debiao He
    [J]. Science China Information Sciences, 2022, 65
  • [46] Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
    Chenyu WANG
    Ding WANG
    Guoai XU
    Debiao HE
    [J]. Science China(Information Sciences), 2022, 65 (01) : 192 - 206
  • [47] A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
    Shashidhara, R.
    Bojjagani, Sriramulu
    Maurya, Anup Kumar
    Kumari, Saru
    Xiong, Hu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 1943 - 1966
  • [48] User-empowered secure privacy-preserving authentication scheme for Digital Twin
    Patel, Chintan
    Pasikhani, Aryan
    Gope, Prosanta
    Clark, John
    [J]. COMPUTERS & SECURITY, 2024, 140
  • [49] Privacy-preserving k nearest neighbor query with authentication on road networks
    Yang, Shumei
    Tang, Shaohua
    Zhang, Xiao
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 134 : 25 - 36
  • [50] On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (15)