An improved dynamic ID-based remote user authentication with key agreement scheme

被引:100
|
作者
Wen, Fengtong [1 ]
Li, Xuelei [1 ]
机构
[1] Univ Jinan, Sch Math Sci, Jinan, Shandong, Peoples R China
关键词
PASSWORD AUTHENTICATION; ENHANCEMENT;
D O I
10.1016/j.compeleceng.2011.11.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2009, Wang et al. presented a dynamic ID-based remote user authentication scheme and claimed that their scheme was more efficient and secure. In this paper, we point out that their scheme is not secure against impersonation attacks launched by any adversary at anytime and could leak some key information to legal users, who can launch an off-line guessing attack. If the adversary could get the secret information stored in the smart cards someway, their scheme will be completely broken down. In addition, their scheme does not provide anonymity for the users, and lacks the functionalities of revocation, key exchange and secret renew for users and servers. Furthermore, we propose a more secure and robust scheme, which does not only cover all the above security flaws and weaknesses, but also provides more functionalities. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:381 / 387
页数:7
相关论文
共 50 条
  • [21] Weaknesses of an efficient and secure dynamic ID-based remote user authentication scheme
    Martinez-Pelaez, Rafael
    Rico-Novella, Francisco
    2012 IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, 2012, 3 : 351 - 353
  • [22] An improved remote user authentication scheme with key agreement
    Kumari, Saru
    Khan, Muhammad Khurram
    Li, Xiong
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1997 - 2012
  • [23] Attacks on Young-Hwa An's Improved Dynamic ID-based Remote User Authentication Scheme
    Xu, Cheng-Qiang
    Zhang, Zhen-Li
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5235 - 5238
  • [24] Attacks and Improvement of "Security Enhancement for a Dynamic ID-based Remote User Authentication Scheme"
    Cheikrouhou, Omar
    Boujelben, Manel
    Koubaa, Anis
    Abid, Mohamed
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 517 - +
  • [25] Robust dynamic ID-based remote user authentication scheme using smart cards
    Li, Xiong
    Niu, Jianwei
    Liu, Yazhi
    Liao, Junguo
    Liang, Wei
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 17 (04) : 254 - 264
  • [26] A Dynamic ID-based User Authentication and Key Agreement Scheme for Multi-server Environment Using Bilinear Pairings
    Geng, Jianyan
    Zhang, Lijiang
    2008 WORKSHOP ON POWER ELECTRONICS AND INTELLIGENT TRANSPORTATION SYSTEM, PROCEEDINGS, 2008, : 33 - +
  • [27] A NOVEL DYNAMIC ID-BASED REMOTE MUTUAL AUTHENTICATION SCHEME
    Hsiang, Han-Cheng
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06): : 2407 - 2415
  • [28] Improving the dynamic ID-based remote mutual authentication scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 499 - +
  • [29] Enhancing the Security of a 'More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme'
    Khan, Muhammad Khurram
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 420 - 424
  • [30] Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment
    He, Debiao
    Huang, Yin
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (01) : 43 - 53