Improved remote user authentication scheme preserving user anonymity

被引:0
|
作者
Hu, Lanlan [1 ]
Yang, Yixian [1 ]
Niu, Xinxin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
关键词
smart cards; authentication; anonymity;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most of smart card-based remote authentication schemes proposed didn't protect the users' identities while authenticating the users, even though user anonymity is an important issue in many e-commerce applications. In 2004, Das et al. proposed a remote authentication scheme to authenticate users while preserving the users' anonymity. Their scheme adopted dynamic identification to achieve this function. Then in 2005, Chien and Chen pointed out Das et al, 's scheme fails to protect the user's anonymity and proposed a new remote authentication scheme preserving user anonymity. This paper, however, will demonstrate that Chien and Chen's scheme has also some problems: it cannot resist strong masquerading server/user attack, insider attack, denial of service attack and restricted replay attack; it also has the problem of slow wrong password detection. Therefore, an improved scheme is proposed to conquer these problems.
引用
收藏
页码:323 / +
页数:3
相关论文
共 50 条
  • [1] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [2] A remote authentication scheme preserving user anonymity
    Chien, HY
    Chen, CH
    [J]. AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248
  • [3] A Remote User Authentication Scheme Preserving User Anonymity and Traceability
    Shao, Shuai
    Li, Hui
    Niu, Xinxi
    Yang, Yixian
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5255 - 5258
  • [4] An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity
    Bapana, Surekha
    Narayana, K. Lakshmi
    Vorugunti, Chandra Sekhar
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1296 - 1301
  • [5] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    [J]. SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [6] Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity
    Kim, Seil
    Chun, Ji Young
    Lee, Dong Hoon
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2235 - 2239
  • [7] An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity
    Khan, Muhammad Khurram
    Kumari, Saru
    [J]. BIOMED RESEARCH INTERNATIONAL, 2013, 2013
  • [8] A bilateral remote user authentication scheme that preserves user anonymity
    Tseng, Huei-Ru
    Jan, Rong-Hong
    Yang, Wuu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (04) : 301 - 308
  • [9] Improved User Authentication Scheme with User Anonymity for Wireless Communications
    Kang, Miyoung
    Rhee, Hyun Sook
    Choi, Jin-Young
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 860 - 864
  • [10] An Improved Bilateral Remote User Authentication Scheme that Preserves User Anonymity using Symmetric Cryptology
    Cho, Jung Gil
    Huh, Won Whoi
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 127 - 136