Improved User Authentication Scheme with User Anonymity for Wireless Communications

被引:18
|
作者
Kang, Miyoung [1 ]
Rhee, Hyun Sook [2 ]
Choi, Jin-Young [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[2] Korea Univ, Grad Sch Informat Management & Secur, Seoul 136701, South Korea
关键词
authentication; anonymity; wireless communications;
D O I
10.1587/transfun.E94.A.860
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a user authentication scheme with user anonymity for wireless communications. Previous works have some weaknesses such as (1) user identity can be revealed from the login message, and (2) after a smart card is no longer valid or is expired, users having the expired smart cards can generate valid login messages under the assumption that the server does not maintain the user information. In this letter, we propose a new user authentication scheme for providing user anonymity. In the proposed scheme, the server is capable of detecting forged login messages by users having only expired smart cards and their passwords without storing user information on the server.
引用
收藏
页码:860 / 864
页数:5
相关论文
共 50 条
  • [41] Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity
    Kim, Seil
    Chun, Ji Young
    Lee, Dong Hoon
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2235 - 2239
  • [42] An Improved of Enhancements of a User Authentication Scheme
    Hwang, Min-Shiang
    Li, Hou-Wen
    Yang, Cheng-Ying
    International Journal of Network Security, 2023, 25 (03) : 508 - 514
  • [43] A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    Li, Chun-Ta
    Lee, Cheng-Chi
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 35 - 44
  • [44] Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS
    Li, Chun-Ta
    Weng, Chi-Yao
    Lee, Cheng-Chi
    Wang, Chun-Cheng
    6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 202 - 209
  • [45] RSA Based Two-Factor Remote User Authentication Scheme with User Anonymity
    Chandrakar, Preeti
    Om, Hari
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 318 - 324
  • [46] An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity
    Kim, Mijin
    Kim, Seungjoo
    Won, Dongho
    WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 244 - 253
  • [47] A Secure Mobility Network Authentication Scheme Ensuring User Anonymity
    Chang, Ya-Fen
    Tai, Wei-Liang
    Hsu, Min-How
    SYMMETRY-BASEL, 2017, 9 (12):
  • [48] A novel wireless authentication protocol preserving user anonymity and untraceability
    Wei, Yongzhuang
    Qiu, Hongbing
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 575 - +
  • [49] Secure Authentication Scheme with Improved Anonymity for Wireless Environments
    Lee, JongHyup
    Kwon, Taekyoung
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (02) : 554 - 557
  • [50] An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Fan, Chun-I
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (01): : 119 - 131