Practical anonymous user authentication scheme with security proof

被引:10
作者
Chien, Hung-Yu [1 ]
机构
[1] Natl Chi Nan Univ, Dept Informat Management, Nantou Hsien, Taiwan
关键词
Smart card; User identification; Authentication; Key distribution; Anonymity; Distributed computer networks;
D O I
10.1016/j.cose.2008.05.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An authenticated key distribution scheme preserving user anonymity is important to those e-commerce applications where user anonymity is required or desirable. However, the previous works on this issue have security flaws. This paper shows the security weaknesses of a recently published work, and then proposes our new scheme, which not only overcomes the weaknesses but also improves the computational performance. The security of the proposed scheme is rigorously examined in a modified Bellare-Rogaway model. (c) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:216 / 223
页数:8
相关论文
共 15 条
[1]  
[Anonymous], ACM OPERATING SYSTEM
[2]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[3]  
BELLARE M, 1995, LNCS, V773, P232
[4]   Improved ID-based security framework for ad hoc network [J].
Chien, Hung-Yu ;
Lin, Ru-Yu .
AD HOC NETWORKS, 2008, 6 (01) :47-60
[5]  
Chien HY, 2005, AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, P245
[6]   Note on robust and simple authentication protocol [J].
Chien, HY ;
Wang, RC ;
Yang, CC .
COMPUTER JOURNAL, 2005, 48 (01) :27-29
[7]  
CHIEN HY, 2007, LNCS
[8]  
GIRAULT M, 1991, IDENTITY BASED IDENT, P481
[9]  
HALEVI S, 1998, P 5 ACM C COMP COMM, P122
[10]   An efficient user identification scheme based on ID-based cryptosystem [J].
Hwang, MS ;
Lo, JW ;
Lin, SC .
COMPUTER STANDARDS & INTERFACES, 2004, 26 (06) :565-569