On Unlinkability of Password-Based Anonymous Authentication

被引:1
|
作者
Shin, SeongHan [1 ]
Kobara, Kazukuni [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, ITRI, Tokyo 1350064, Japan
关键词
password; authentication; anonymity; ISO/IEC20009-4; unlinkability; KEY EXCHANGE; SECURE;
D O I
10.1587/transfun.E98.A.1320
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Password-based anonymous authentication schemes provide not only password-based authentication but also user anonymity. In [15], Yang et al., proposed a password-based anonymous authentication scheme (we call it YZWB10 scheme) using the password-protected credentials. This scheme has being standardized in ISO/IEC20009-4 that was approved to proceed to the CD stage in the 49th ISO/IECJTC1/SC27 Mexico meeting. In this paper, we analyze unlinkability of the YZWB10 scheme [15]. In particular, we show that a (malicious) server in the YZWB10 scheme can specify which user actually sent the login request to the server. Unlike Yang et al.,'s claim, the YZWB10 scheme [15] does not provide unlinkability against server.
引用
收藏
页码:1320 / 1324
页数:5
相关论文
共 50 条
  • [1] A Secure Anonymous Password-based Authentication Protocol with Control of Authentication Numbers
    Shin, SeongHan
    Kobara, Kazukuni
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 325 - 329
  • [2] How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme
    Shin, SeongHan
    Kobara, Kazukuni
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (03): : 803 - 807
  • [3] Secure password-based authentication scheme with anonymous identity without smart cards
    The Key Laboratory of Aerospace Information Security and Trust Computing, School of Computer, Wuhan University, Wuhan 430072, China
    不详
    不详
    [J]. Tongxin Xuebao, 2008, 10 (70-75):
  • [4] Secure password-based authentication in WLAN
    Keshava, M.
    [J]. Journal of the Indian Institute of Science, 2006, 86 (04) : 389 - 396
  • [5] Securing Password in Static Password-based Authentication: A Review
    Mohamedali, Intisar A.
    Fadlalla, Yahia
    [J]. PROCEEDINGS OF 2017 SUDAN CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (SCCSIT), 2017, : 98 - 102
  • [6] Neuromuscular Password-Based User Authentication
    Jiang, Xinyu
    Xu, Ke
    Liu, Xiangyu
    Dai, Chenyun
    Clifton, David A.
    Clancy, Edward A.
    Akay, Metin
    Chen, Wei
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) : 2641 - 2652
  • [7] A provably secure password-based anonymous authentication scheme for wireless body area networks
    Wei, Fushan
    Vijayakumar, P.
    Shen, Jian
    Zhang, Ruijie
    Li, Li
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 65 : 322 - 331
  • [8] PASTA: PASsword-based Threshold Authentication
    Agrawal, Shashank
    Miao, Peihan
    Mohassel, Payman
    Mukherjee, Pratyay
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2042 - 2059
  • [9] A Protocol to Strengthen Password-Based Authentication
    Sandoval, Itzel Vazquez
    Stojkovski, Borce
    Lenzini, Gabriele
    [J]. EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 2018, 11263 : 38 - 46
  • [10] Anonymous password-based authenticated key exchange
    Viet, DQ
    Yamamura, A
    Tanaka, H
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 244 - 257