An improved dynamic ID-based remote user authentication with key agreement scheme

被引:99
|
作者
Wen, Fengtong [1 ]
Li, Xuelei [1 ]
机构
[1] Univ Jinan, Sch Math Sci, Jinan, Shandong, Peoples R China
关键词
PASSWORD AUTHENTICATION; ENHANCEMENT;
D O I
10.1016/j.compeleceng.2011.11.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2009, Wang et al. presented a dynamic ID-based remote user authentication scheme and claimed that their scheme was more efficient and secure. In this paper, we point out that their scheme is not secure against impersonation attacks launched by any adversary at anytime and could leak some key information to legal users, who can launch an off-line guessing attack. If the adversary could get the secret information stored in the smart cards someway, their scheme will be completely broken down. In addition, their scheme does not provide anonymity for the users, and lacks the functionalities of revocation, key exchange and secret renew for users and servers. Furthermore, we propose a more secure and robust scheme, which does not only cover all the above security flaws and weaknesses, but also provides more functionalities. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:381 / 387
页数:7
相关论文
共 50 条
  • [31] An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    Yang, Jen-Ho
    Chang, Chin-Chen
    [J]. COMPUTERS & SECURITY, 2009, 28 (3-4) : 138 - 143
  • [32] Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards
    Ku, WC
    Chang, ST
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (05) : 2165 - 2167
  • [33] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    [J]. World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
  • [34] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    [J]. World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
  • [35] Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement
    Kaul, Sonam Devgan
    Awasthi, Amit K.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 621 - 637
  • [36] Security Enhancement of an Improved Remote User Authentication Scheme with Key Agreement
    Sonam Devgan Kaul
    Amit K. Awasthi
    [J]. Wireless Personal Communications, 2016, 89 : 621 - 637
  • [37] Improved Biometrics-Based Remote User Authentication Scheme with Session Key Agreement
    An, Younghwa
    [J]. COMPUTER APPLICATIONS FOR GRAPHICS, GRID COMPUTING, AND INDUSTRIAL ENVIRONMENT, 2012, 351 : 307 - 315
  • [38] DYNAMIC ID-BASED REMOTE USER MUTUAL AUTHENTICATION SCHEME WITH SMARTCARD USING ELLIPTIC CURVE CRYPTOGRAPHY
    SK Hafizul Islam
    G.P.Biswas
    [J]. Journal of Electronics(China), 2014, 31 (05) : 473 - 488
  • [39] Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
    Khan, Muhammad Khurram
    Kim, Soo-Kyun
    Alghathbar, Khaled
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 305 - 309
  • [40] An ID-Based User Authentication Scheme for Cloud Computing
    Yang, Jen-Ho
    Lin, Pei-Yu
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101