Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity

被引:0
|
作者
Kim, Seil [1 ]
Chun, Ji Young [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Grad Sch Informat Management & Secur, Seoul 136701, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Lately, remote user authentication schemes using smart cards have been researched to provide user privacy. Previously provided schemes based on smart cards were only concerned about providing mutual authentication with key exchange, but the schemes preserving user anonymity have been recently demanded because the user privacy is an important issue in many e-commerce applications. In 2007, Hu et al. pointed out that Chien and Chen's scheme fails to protect the user anonymity and proposed a scheme preserving user anonymity. In 2008, Bindu et al. also pointed out Chien and Chen's scheme fails to protect the user anonymity and suggested a scheme preserving user anonymity. Unfortunately, neither scheme guarantee user anonymity against an insider adversary who is a legal user. In this paper, we first point out that both Hu et al.'s scheme and Bindu et al.'s scheme are still vulnerable to the insider attack.
引用
收藏
页码:2235 / 2239
页数:5
相关论文
共 50 条
  • [1] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [2] Improved remote user authentication scheme preserving user anonymity
    Hu, Lanlan
    Yang, Yixian
    Niu, Xinxin
    [J]. CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 323 - +
  • [3] Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy
    Peng, Jian-Wen
    Horng, Wen-Bing
    Chiu, Ying-Ching
    Liu, Chao-Sheng
    [J]. JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 277 - 286
  • [4] Cryptanalysis of two user identification schemes with key distribution preserving anonymity
    Yoon, EJ
    Yoo, KY
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 315 - 322
  • [5] A Remote User Authentication Scheme Preserving User Anonymity and Traceability
    Shao, Shuai
    Li, Hui
    Niu, Xinxi
    Yang, Yixian
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5255 - 5258
  • [6] A remote authentication scheme preserving user anonymity
    Chien, HY
    Chen, CH
    [J]. AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248
  • [7] Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06): : 1687 - 1689
  • [8] An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity
    Bapana, Surekha
    Narayana, K. Lakshmi
    Vorugunti, Chandra Sekhar
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1296 - 1301
  • [9] Cryptanalysis of the User Authentication Scheme with Anonymity
    Jeon, Woongryul
    Kim, Jeeyeon
    Nam, Junghyun
    Lee, Youngsook
    Won, Dongho
    [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 285 - +
  • [10] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417