An improved dynamic ID-based remote user authentication with key agreement scheme

被引:100
|
作者
Wen, Fengtong [1 ]
Li, Xuelei [1 ]
机构
[1] Univ Jinan, Sch Math Sci, Jinan, Shandong, Peoples R China
关键词
PASSWORD AUTHENTICATION; ENHANCEMENT;
D O I
10.1016/j.compeleceng.2011.11.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In 2009, Wang et al. presented a dynamic ID-based remote user authentication scheme and claimed that their scheme was more efficient and secure. In this paper, we point out that their scheme is not secure against impersonation attacks launched by any adversary at anytime and could leak some key information to legal users, who can launch an off-line guessing attack. If the adversary could get the secret information stored in the smart cards someway, their scheme will be completely broken down. In addition, their scheme does not provide anonymity for the users, and lacks the functionalities of revocation, key exchange and secret renew for users and servers. Furthermore, we propose a more secure and robust scheme, which does not only cover all the above security flaws and weaknesses, but also provides more functionalities. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:381 / 387
页数:7
相关论文
共 50 条
  • [41] ID-Based User Authentication Scheme for Cloud Computing
    Ping-Liang Chen
    Jen-Ho Yang
    Ching-I Lin
    Journal of Electronic Science and Technology, 2013, (02) : 221 - 224
  • [42] ID-Based User Authentication Scheme for Cloud Computing
    PingLiang Chen
    JenHo Yang
    ChingI Lin
    JournalofElectronicScienceandTechnology, 2013, 11 (02) : 221 - 224
  • [43] Cryptanalysis of Remote User Authentication Scheme with key agreement
    Madhusudan, R.
    Valiveti, Annapurna
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [44] Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy
    Peng, Jian-Wen
    Horng, Wen-Bing
    Chiu, Ying-Ching
    Liu, Chao-Sheng
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 277 - 286
  • [45] Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards
    Leu, Jenq-Shiou
    Hsieh, Wen-Bin
    IET INFORMATION SECURITY, 2014, 8 (02) : 104 - 113
  • [46] On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity
    Sun, Da-Zhi
    Cao, Zhen-Fu
    CRYPTOLOGIA, 2013, 37 (04) : 345 - 355
  • [47] Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments
    He, Debiao
    Hu, Hao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (01): : 138 - 140
  • [48] An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment
    Sun, Qimin
    Moon, Jongho
    Choi, Younsung
    Won, Dongho
    GREEN, PERVASIVE, AND CLOUD COMPUTING, 2016, 9663 : 229 - 242
  • [49] Weaknesses of a secure dynamic id based remote user authentication scheme
    Chen, Bae-Ling
    Kuo, Wen-Chung
    Chu, Yu-Shuan
    Journal of Convergence Information Technology, 2010, 5 (04)
  • [50] An Improved ID-Based Group Key Agreement Protocol
    Kangwen Hu
    Jingfeng Xue
    Changzhen Hu
    Rui Ma
    Zhiqiang Li
    Tsinghua Science and Technology, 2014, 19 (05) : 421 - 428