Cryptanalysis of two user identification schemes with key distribution preserving anonymity

被引:0
|
作者
Yoon, EJ [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Engn, Taegu 702701, South Korea
关键词
cryptography; password; key establishment; forward secrecy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2004, Wu-Hsu proposed an efficient identification scheme preserving anonymity. However, Yang et al. showed that Wu-Hsu's scheme has a serious weakness, by which the service provider can learn the secret token of the user who requests services. To overcome this limitation, they further proposed a scheme to attain the same set of objectives as the previous works. Nevertheless, the two schemes still have other serious weaknesses. Accordingly, the current paper demonstrates the vulnerability of the two schemes. Furthermore, we present a method to avoid attack.
引用
收藏
页码:315 / 322
页数:8
相关论文
共 50 条
  • [1] Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity
    Kim, Seil
    Chun, Ji Young
    Lee, Dong Hoon
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2235 - 2239
  • [2] A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks
    Hsu, Chien-Lung
    Chuang, Yu-Hao
    [J]. INFORMATION SCIENCES, 2009, 179 (04) : 422 - 429
  • [3] Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
    Wu, TS
    Hsu, CL
    [J]. COMPUTERS & SECURITY, 2004, 23 (02) : 120 - 125
  • [4] Security on efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
    Li, JG
    Zhang, YC
    Zhu, YL
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1584 - 1586
  • [5] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [6] Cryptanalysis of Two Identification Schemes
    Tan, Syh-Yuan
    Chin, Ji-Jian
    Behnia, Rouzbeh
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 33 - 36
  • [7] Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy
    Peng, Jian-Wen
    Horng, Wen-Bing
    Chiu, Ying-Ching
    Liu, Chao-Sheng
    [J]. JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 277 - 286
  • [8] User identification and key distribution maintaining anonymity for distributed computer networks
    Lee, WB
    Chang, CC
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2000, 15 (04): : 211 - 214
  • [9] On the conference key distribution system with user anonymity
    Tselikis, Christos
    Douligeris, Christos
    Maglaras, Leandros
    Mitropoulos, Sarandis
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [10] A lightweight authentication and key agreement protocol preserving user anonymity
    Morteza Nikooghadam
    Reza Jahantigh
    Hamed Arshad
    [J]. Multimedia Tools and Applications, 2017, 76 : 13401 - 13423