Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks

被引:4
|
作者
Shi, Run-hua [1 ]
Zhong, Hong [1 ]
Zhang, Shun [1 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Key agreement; Elliptic curve cryptography; Client-server network;
D O I
10.1007/s11227-015-1496-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent papers (J Supercomput 66(2):973-988, 2013; J Supercomput 69(1):395-411, 2014), the authors presented two efficient identity-based authenticated key agreement schemes for mobile client-server networks, respectively. In this letter, we show that there is a serious security flaw in the user registration phase of the two schemes: any authorized user can impersonate the server to generate an effective private key of any other user. We then present a suggestion to overcome the problem without losing any good features of the original schemes.
引用
收藏
页码:4015 / 4018
页数:4
相关论文
共 50 条
  • [41] Two proposed identity-based three-party authenticated key agreement protocols from pairings
    Holbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    COMPUTERS & SECURITY, 2010, 29 (02) : 244 - 252
  • [42] Distributed utility based User Authentication protocol for multi-server environment with key agreement utility
    Anand, Darpan
    Khemchandani, Vineeta
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 415 - 420
  • [43] A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm
    Xia, Tao
    Wang, Menglin
    He, Jun
    Yang, Gang
    Fan, Linna
    Wei, Guoheng
    DRONES, 2024, 8 (08)
  • [44] An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks
    Li, Congcong
    Zhang, Xi
    Wang, Haiping
    Li, Dongfeng
    SENSORS, 2018, 18 (01)
  • [45] A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Kumar, Neeraj
    Park, YoHan
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 1732 - 1741
  • [46] An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks
    Gope, Prosanta
    Hwang, Tzonelih
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 : 1 - 8
  • [47] A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chen, Ying
    Ge, Yangming
    Wang, Wenyuan
    Yang, Fengyu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04): : 1779 - 1798
  • [48] An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks
    Jung, Jaewook
    Kim, Jiye
    Choi, Younsung
    Won, Dongho
    SENSORS, 2016, 16 (08)
  • [49] Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
    Qu, Juan
    Tan, Xiao-Ling
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014
  • [50] A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Lu, Yanrong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 813 - 832