On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity

被引:5
|
作者
Sun, Da-Zhi [1 ]
Cao, Zhen-Fu [1 ]
机构
[1] Tianjin Univ, Sch Comp Sci & Technol, Tianjin 300072, Peoples R China
基金
中国国家自然科学基金;
关键词
anonymity; authentication; cryptanalysis; network security; smart card; EFFICIENT; IMPROVEMENT;
D O I
10.1080/01611194.2013.797039
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Very recently, Khan, Kim, and Alghathbar [6] proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme can provide user anonymity. However, in this article, the authors demonstrate that either a malicious user or an adversary with a valid smart card can trace any user by eavesdropping on his normal authentication session over the public channel. Therefore, Khan et al.'s scheme fails to provide the privacy service as claimed. Hence, the authors present an improved scheme to overcome its flaw and examine the privacy of the improved scheme by using the smart card-based privacy model. In addition, the security and efficiency of the improved scheme are scrutinized. The conclusive result is that the design of the improved scheme is reasonable in not only both privacy and security aspects but also the performance aspect.
引用
收藏
页码:345 / 355
页数:11
相关论文
共 50 条
  • [1] A dynamic ID-based remote user authentication scheme
    Das, ML
    Saxena, A
    Gulati, VP
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) : 629 - 631
  • [2] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme
    Khan, Muhammad Khurram
    Kumari, Saru
    Wang, Xiaomin
    Kumar, Rahul
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
  • [3] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme
    Ma, Chun-Guang
    Wang, Ding
    Zhang, Qi-Ming
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
  • [4] A modified dynamic ID-based remote user authentication scheme
    Zhang, Xin
    Feng, Quanyuan
    Li, Miao
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1602 - +
  • [5] A Novel Dynamic ID-Based Remote User Authentication Scheme
    Misbahuddin, Md.
    Ahmed, Md. Aijaz
    Rao, A. Ananda
    Bindu, C. Shoba
    Khan, M. A. Muqsit
    [J]. 2006 ANNUAL IEEE INDIA CONFERENCE, 2006, : 364 - +
  • [6] Weaknesses of a dynamic ID-based remote user authentication scheme
    He, Debiao
    Chen, Jianhua
    Zhang, Rui
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2010, 3 (04) : 355 - 362
  • [7] Improvement on the dynamic ID-based remote user authentication scheme
    Lee, Yung-Cheng
    Chang, Geeng-Kwei
    Kuo, Wen-Chung
    Chu, Jung-Lu
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3283 - +
  • [8] Security enhancement for a dynamic ID-based remote user authentication scheme
    Liao, IE
    Lee, CC
    Hwang, MS
    [J]. International Conference on Next Generation Web Services Practices, 2005, : 437 - 440
  • [9] An improved dynamic ID-based remote user authentication with key agreement scheme
    Wen, Fengtong
    Li, Xuelei
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) : 381 - 387
  • [10] Two-Factor Dynamic ID-Based Remote User Authentication Scheme
    Huang, Renjun
    Su, Fengfu
    Chen, Yangyi
    [J]. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 373 - 377