An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

被引:1
|
作者
Ya-Fen Chang and Pei-Yu Chang Department of Computer Science and Information Engineering
机构
关键词
Authentication; key agreement; smart card; user anonymity;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
When accessing remote services over public networks, a user authentication mechanism is required because these activities are executed in an insecure communication environment. Recently, Wang et al. proposed an authentication and key agreement scheme preserving the privacy of secret keys and providing user anonymity. Later, Chang et al. indicated that their scheme suffers from two security flaws. First, it cannot resist DoS (denial-of-service) attack because the indicators for the next session are not consistent. Second, the user password may be modified by a malicious attacker because no authentication mechanism is applied before the user password is updated. To eliminate the security flaws and preserve the advantages of Wang et al.’s scheme, we propose an improvement in this paper.
引用
收藏
页码:352 / 358
页数:7
相关论文
共 50 条
  • [1] An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity
    Kim, Mijin
    Kim, Seungjoo
    Won, Dongho
    [J]. WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 244 - 253
  • [2] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    [J]. 2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [3] An improved remote user authentication scheme with key agreement
    Kumari, Saru
    Khan, Muhammad Khurram
    Li, Xiong
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1997 - 2012
  • [4] A secure authentication and key agreement scheme for roaming service with user anonymity
    Arshad, Hamed
    Rasoolzadegan, Abbas
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (18)
  • [5] An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Fan, Chun-I
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (01): : 119 - 131
  • [6] Improved remote user authentication scheme preserving user anonymity
    Hu, Lanlan
    Yang, Yixian
    Niu, Xinxin
    [J]. CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 323 - +
  • [7] Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Kang, Miyoung
    Rhee, Hyun Sook
    Choi, Jin-Young
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 860 - 864
  • [8] An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city
    Li, Xiong
    Sangaiah, Arun Kumar
    Kumari, Saru
    Wu, Fan
    Shen, Jian
    Khan, Muhammad Khurram
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 791 - 805
  • [9] An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city
    Xiong Li
    Arun Kumar Sangaiah
    Saru Kumari
    Fan Wu
    Jian Shen
    Muhammad Khurram Khan
    [J]. Personal and Ubiquitous Computing, 2017, 21 : 791 - 805
  • [10] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689