Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications

被引:0
|
作者
Yoon, Eun-Jun [2 ]
Yoo, Kee-Young [1 ]
机构
[1] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu 702701, South Korea
[2] Kyungil Univ, Dept Cyber Secur, Kyungsan Si 712701, Kyungsangpuk Do, South Korea
来源
基金
新加坡国家研究基金会;
关键词
cryptanalysis; authentication; anonymity; wireless communications; security;
D O I
10.1587/transinf.E95.D.1687
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A user identity anonymity is an important property for roaming services. In 2011, Kang et al. proposed an improved user authentication scheme that guarantees user anonymity in wireless communications. This letter shows that Kang et al.'s improved scheme still cannot provide user anonymity as they claimed.
引用
收藏
页码:1687 / 1689
页数:3
相关论文
共 50 条
  • [21] A Remote User Authentication Scheme Preserving User Anonymity and Traceability
    Shao, Shuai
    Li, Hui
    Niu, Xinxi
    Yang, Yixian
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5255 - 5258
  • [22] Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care
    Xu, Lili
    Wu, Fan
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (02)
  • [23] A bilateral remote user authentication scheme that preserves user anonymity
    Tseng, Huei-Ru
    Jan, Rong-Hong
    Yang, Wuu
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (04) : 301 - 308
  • [24] An Improved Bilateral Remote User Authentication Scheme that Preserves User Anonymity using Symmetric Cryptology
    Cho, Jung Gil
    Huh, Won Whoi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 127 - 136
  • [25] Cryptanalysis of "An Improved Timestamp-Based Remote User Authentication Scheme"
    Kumari, Saru
    Gupta, Mridul K.
    Khan, Muhammad Khurram
    Bin Muhaya, Fahad T.
    2012 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2012, : 1439 - 1442
  • [26] An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
    Xu, Lili
    Wu, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 245 - 260
  • [27] An Improved User Authentication Scheme for Wireless Mesh Networks
    Cui Xinchun
    Wang Xinheng
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 915 - 918
  • [28] Cryptanalysis and improvement of a remote user authentication scheme
    Ou Qingyu
    Huang Kai
    Li Guang
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 49 - +
  • [29] An efficient user authentication scheme with smart cards for wireless communications
    Won, D. (dhwon@security.re.kr), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (07):
  • [30] An Efficient User Authentication Scheme with Smart Cards for Wireless Communications
    Jeon, Woongryul
    Lee, Yunho
    Won, Dongho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 1 - 15