New dynamic ID authentication scheme using smart cards

被引:68
作者
Tsai, Jia-Lun [1 ]
Wu, Tzong-Chen [1 ,2 ]
Tsai, Kuo-Yu [2 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei 106, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Taiwan Informat Secur Ctr, Taipei 106, Taiwan
关键词
authentication; dynamic ID; ID-theft; user anonymity; impersonation attack; BAN-logic; PASSWORD AUTHENTICATION; EFFICIENT; PROTOCOL;
D O I
10.1002/dac.1118
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, Yoon et al. and Wang et al. independently proposed a dynamic ID authentication scheme and claimed that their schemes can withstand the risk of ID-theft, and several attacks. In this paper, we first demonstrate that both of the proposed schemes cannot achieve the security requirement for user anonymity and resist an impersonation attack yet. Then, we shall propose a new dynamic ID authentication scheme to overcome the above security weaknesses. We formally analyzed our proposed scheme with the BAN-logic and shown that it can withstand the several possible attacks. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:1449 / 1462
页数:14
相关论文
共 20 条
[1]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[2]  
CHIEN HY, 2005, 19 INT C ADV INF NET, V2, P245
[3]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[4]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[5]   A simple three-party password-based key exchange protocol [J].
Huang, Hui-Feng .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (07) :857-862
[6]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[7]  
KUO WC, 2007, P 6 INT C MACH LEARN, P19
[8]  
Lal S., 2005, SECURITY ANAL DYNAMI
[9]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[10]  
Liao IE, 2005, International Conference on Next Generation Web Services Practices, P437