Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks

被引:4
|
作者
Shi, Run-hua [1 ]
Zhong, Hong [1 ]
Zhang, Shun [1 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Key agreement; Elliptic curve cryptography; Client-server network;
D O I
10.1007/s11227-015-1496-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent papers (J Supercomput 66(2):973-988, 2013; J Supercomput 69(1):395-411, 2014), the authors presented two efficient identity-based authenticated key agreement schemes for mobile client-server networks, respectively. In this letter, we show that there is a serious security flaw in the user registration phase of the two schemes: any authorized user can impersonate the server to generate an effective private key of any other user. We then present a suggestion to overcome the problem without losing any good features of the original schemes.
引用
收藏
页码:4015 / 4018
页数:4
相关论文
共 50 条
  • [31] Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (03): : 1273 - 1288
  • [32] Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1331 - 1339
  • [33] On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices
    Wang, Ding
    Cheng, Haibo
    He, Debiao
    Wang, Ping
    IEEE SYSTEMS JOURNAL, 2018, 12 (01): : 916 - 925
  • [34] Two ID-based authenticated schemes with key agreement for mobile environments
    Chou, Chih-Ho
    Tsai, Kuo-Yu
    Lu, Chung-Fu
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02) : 973 - 988
  • [35] Two ID-based authenticated schemes with key agreement for mobile environments
    Chih-Ho Chou
    Kuo-Yu Tsai
    Chung-Fu Lu
    The Journal of Supercomputing, 2013, 66 : 973 - 988
  • [36] Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (01) : 155 - 170
  • [37] Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client-Server Systems
    Deebak, Bakkiam David
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (03) : 1013 - 1035
  • [38] An improved two-party identity-based authenticated key agreement protocol using pairings
    Hoelbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (01) : 142 - 150
  • [39] An Improved Anonymous Remote user Authentication Scheme with Key Agreement based on Dynamic Identity
    Shi, Yajuan
    Shen, Han
    Zhang, Yuanyuan
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 255 - 268
  • [40] Secure Mobile User Authentication and Key Agreement Protocol with Privacy Protection in Global Mobility Networks
    Xie, Qi
    Bao, Mengjie
    Dong, Na
    Hu, Bin
    Wong, Duncan S.
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 124 - 129