Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision (vol 19, pg 1227, 2022)

被引:0
|
作者
Cao, Zhengjun [1 ]
机构
[1] Shanghai Univ, Dept Math, Shanghai 200444, Peoples R China
关键词
Passwords; Smart cards; Public key; Servers; Encryption; Authentication; Impersonation attacks; Impersonation attack; key agreement; mutual authentication; offline password guessing attack; user anonymity;
D O I
10.1109/TDSC.2023.3302300
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We show that the key agreement scheme [IEEE TDSC, 2022, 19(2): 1227-1238] is vulnerable to offline password guessing attack, not as claimed. We also reiterate the signification of an identifier which has often been neglected by some researchers.
引用
收藏
页码:4304 / 4305
页数:2
相关论文
共 21 条
  • [1] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision
    Abbasinezhad-Mood, Dariush
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    Ostad-Sharif, Arezou
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1227 - 1238
  • [2] A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party
    Mishra, Dheerendra
    Dharminder, Dharminder
    Yadav, Preeti
    Rao, Y. Sreenivasa
    Vijayakumar, Pandi
    Kumar, Neeraj
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [3] Security of an efficient ID-based authenticated key agreement protocol from pairings
    Wang, SB
    Cao, ZF
    Bao, HY
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 342 - 349
  • [4] Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
    Xie, Qi
    Wong, Duncan S.
    Wang, Guilin
    Tan, Xiao
    Chen, Kefei
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) : 1382 - 1392
  • [5] Comments on "Provably Secure Dynamic Id-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model"
    Li, Xiaowei
    Yang, Dengqi
    Zeng, Xing
    Chen, Benhui
    Zhang, Yuqing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) : 3344 - 3345
  • [6] A SECURE AND EFFICIENCY ID-BASED AUTHENTICATED KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM FOR MOBILE DEVICES
    Yoon, Eun-Jun
    Choi, Sung-Bae
    Yoo, Kee-Young
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (04): : 2637 - 2653
  • [7] On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06) : 1684 - 1686
  • [8] Security Improvements of Dynamic ID-based Remote User Authentication Scheme with Session Key Agreement
    An, Young-Hwa
    [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1072 - 1076
  • [9] An Efficient and Secure, ID-based Authenticated, Asymmetric Group Key Agreement Protocol for Ubiquitous Pay-TV Networks
    Khatoon, Shaheena
    Rahman, Sk Md Mizanur
    Tso, Raylin
    Alhamid, Mohammed F.
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1387 - 1395
  • [10] Enhancing the Security of a 'More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme'
    Khan, Muhammad Khurram
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 420 - 424