An Efficient Remote User Authentication Scheme with Strong Anonymity

被引:2
|
作者
Liu, Yanfei [1 ]
Zhao, Ziming [1 ]
Li, Hui [1 ]
Luo, Qun [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS | 2008年
关键词
D O I
10.1109/CW.2008.23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, many remote authentication schemes attempt to preserve user anonymity from the eavesdropper. However, authentication schemes in many e-commerce transactions require not only anonymous to the eavesdropper but also to the authentication server. In this paper, we propose a remote authentication scheme using smart card to fulfill both of the requirements. The proposed scheme achieves mutual authentication and allows users to choose and change their own passwords freely and securely. We only use one-way hash function and bitwise XOR operation in the proposed scheme and so the scheme has a low computational complexity. By using timestamp and random numbers, the proposed scheme can resist the denial of service attack and the replay attack. Also, the scheme is secure against guessing attack, insider attack, stolen-verifier attack, reflection attack, and impersonation attack.
引用
收藏
页码:180 / 185
页数:6
相关论文
共 50 条
  • [1] An Energy Efficient Remote User Authentication Scheme Preserving User Anonymity
    Bapana, Surekha
    Narayana, K. Lakshmi
    Vorugunti, Chandra Sekhar
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1296 - 1301
  • [2] Remote user authentication scheme with user anonymity
    Lee, WB
    Chen, HB
    Dow, CR
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 412 - 417
  • [3] A remote authentication scheme preserving user anonymity
    Chien, HY
    Chen, CH
    AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 245 - 248
  • [4] A Remote User Authentication Scheme Preserving User Anonymity and Traceability
    Shao, Shuai
    Li, Hui
    Niu, Xinxi
    Yang, Yixian
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 5255 - 5258
  • [5] Improved remote user authentication scheme preserving user anonymity
    Hu, Lanlan
    Yang, Yixian
    Niu, Xinxin
    CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 323 - +
  • [6] A bilateral remote user authentication scheme that preserves user anonymity
    Tseng, Huei-Ru
    Jan, Rong-Hong
    Yang, Wuu
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (04) : 301 - 308
  • [7] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9
  • [8] Cryptanalysis on Improved Remote User Authentication Scheme Preserving User Anonymity
    Lee, Sung-Woon
    Kwon, Hyuck-Jin
    Kim, Hyun-Sung
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 21 - 24
  • [9] Security enhancements of a remote user authentication scheme preserving user anonymity
    An, Younghwa
    Yang, Hyungkyu
    International Journal of Multimedia and Ubiquitous Engineering, 2013, 8 (01): : 129 - 138
  • [10] An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity
    Khan, Muhammad Khurram
    Kumari, Saru
    BIOMED RESEARCH INTERNATIONAL, 2013, 2013