An Efficient Remote User Authentication Scheme with Strong Anonymity

被引:2
作者
Liu, Yanfei [1 ]
Zhao, Ziming [1 ]
Li, Hui [1 ]
Luo, Qun [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS | 2008年
关键词
D O I
10.1109/CW.2008.23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, many remote authentication schemes attempt to preserve user anonymity from the eavesdropper. However, authentication schemes in many e-commerce transactions require not only anonymous to the eavesdropper but also to the authentication server. In this paper, we propose a remote authentication scheme using smart card to fulfill both of the requirements. The proposed scheme achieves mutual authentication and allows users to choose and change their own passwords freely and securely. We only use one-way hash function and bitwise XOR operation in the proposed scheme and so the scheme has a low computational complexity. By using timestamp and random numbers, the proposed scheme can resist the denial of service attack and the replay attack. Also, the scheme is secure against guessing attack, insider attack, stolen-verifier attack, reflection attack, and impersonation attack.
引用
收藏
页码:180 / 185
页数:6
相关论文
共 50 条
[21]   An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity [J].
Xu, Lili ;
Wu, Fan .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) :245-260
[22]   Strong Remote User Authentication Scheme using Smart Cards [J].
Martinez-Pelaez, Rafael ;
Rico-Novella, Francisco ;
Satizabal, Cristina ;
Pomykala, Jacek .
PROCEEDINGS OF THE 8TH INTERNATIONAL NETWORK CONFERENCE (INC 2010), 2010, :199-208
[23]   A remote user authentication scheme using strong graphical passwords [J].
Ku, WC ;
Tsaur, MJ .
LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, :351-355
[24]   An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks [J].
Gope, Prosanta ;
Hwang, Tzonelih .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 62 :1-8
[25]   A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity [J].
Xiong, Hu ;
Kang, Zhiqing ;
Chen, Jinhao ;
Tao, Junyi ;
Yuan, Chen ;
Kumari, Saru .
IEEE SYSTEMS JOURNAL, 2021, 15 (02) :2156-2167
[26]   A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Ya-Fen Chang ;
Shih-Hui Yu ;
Ding-Rui Shiao .
Journal of Medical Systems, 2013, 37
[27]   Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme [J].
Li, Xiong ;
Niu, Jianwei ;
Khan, Muhammad Khurram ;
Wang, Zhibo .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
[28]   New efficient user authentication scheme with user anonymity facilitating e-commerce applications [J].
Chien, Hung-Yu .
9TH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY/4TH IEEE INTERNATIONAL CONFERENCE ON ENTERPRISE COMPUTING, E-COMMERCE AND E-SERVICES, 2007, :461-464
[29]   A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Chang, Ya-Fen ;
Yu, Shih-Hui ;
Shiao, Ding-Rui .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[30]   More secure smart card-based remote user password authentication scheme with user anonymity [J].
Kumari, Saru ;
Khan, Muhammad Khurram .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) :2039-2053