Robust smart-cards-based user authentication scheme with user anonymity

被引:59
|
作者
Wu, Shuhua [1 ,2 ]
Zhu, Yuefei [1 ]
Pu, Qiong [2 ]
机构
[1] Informat Sci & Technol Inst, Dept Networks Engn, Zhengzhou, Peoples R China
[2] Informat Engn Univ, Inst Sci, Dept Elect, Zhengzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
authentication; key agreement; user anonymity; smart card; PASSWORD AUTHENTICATION; KEY; SECURITY; EFFICIENT; CRYPTANALYSIS;
D O I
10.1002/sec.315
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we mainly investigate anonymous user authentication scheme using smart card. We first demonstrate security weaknesses still exist in two such schemes recently propose by Wang et al. and Tsai et al., respectively according to Wang et al.'s criteria. Thereafter, we propose an enhanced smart-card-based authentication scheme with user anonymity for providing all the admired requirements at the same time. Compared with the previous schemes, our scheme is yet efficient both in computation and communication cost. Moreover, we can prove the security of the proposed scheme in the random oracle model. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:236 / 248
页数:13
相关论文
共 50 条
  • [1] Smart Card Based User Authentication Scheme with Anonymity
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 : 220 - 233
  • [2] An Elliptic Curve Based User Authentication Scheme with Smart Cards
    Jia, Zhongtian
    Zhang, Yuan
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (04): : 283 - 292
  • [3] A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04): : 1069 - 1080
  • [4] One-time password authentication scheme using smart cards providing user anonymity
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 303 - 311
  • [5] SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY
    Li, Chun-Ta
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (02): : 157 - 162
  • [6] Robust dynamic ID-based remote user authentication scheme using smart cards
    Li, Xiong
    Niu, Jianwei
    Liu, Yazhi
    Liao, Junguo
    Liang, Wei
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 17 (04) : 254 - 264
  • [7] A robust anonymous biometric-based remote user authentication scheme using smart cards
    Das, Ashok Kumar
    Goswami, Adrijit
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (02) : 193 - 210
  • [8] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [9] Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain
    Kang, Dongwoo
    Jung, Jaewook
    Mun, Jongho
    Lee, Donghoon
    Choi, Younsung
    Won, Dongho
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1462 - 1476
  • [10] Further cryptanalysis of 'A user friendly remote user authentication scheme with smart cards'
    Khan, Muhammad Khurram
    [J]. ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 101 - 105