An Efficient Remote User Authentication Scheme with Strong Anonymity

被引:2
作者
Liu, Yanfei [1 ]
Zhao, Ziming [1 ]
Li, Hui [1 ]
Luo, Qun [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS | 2008年
关键词
D O I
10.1109/CW.2008.23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, many remote authentication schemes attempt to preserve user anonymity from the eavesdropper. However, authentication schemes in many e-commerce transactions require not only anonymous to the eavesdropper but also to the authentication server. In this paper, we propose a remote authentication scheme using smart card to fulfill both of the requirements. The proposed scheme achieves mutual authentication and allows users to choose and change their own passwords freely and securely. We only use one-way hash function and bitwise XOR operation in the proposed scheme and so the scheme has a low computational complexity. By using timestamp and random numbers, the proposed scheme can resist the denial of service attack and the replay attack. Also, the scheme is secure against guessing attack, insider attack, stolen-verifier attack, reflection attack, and impersonation attack.
引用
收藏
页码:180 / 185
页数:6
相关论文
共 50 条
[31]   A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Chang, Ya-Fen ;
Yu, Shih-Hui ;
Shiao, Ding-Rui .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[32]   More secure smart card-based remote user password authentication scheme with user anonymity [J].
Kumari, Saru ;
Khan, Muhammad Khurram .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) :2039-2053
[33]   Improved User Authentication Scheme with User Anonymity for Wireless Communications [J].
Kang, Miyoung ;
Rhee, Hyun Sook ;
Choi, Jin-Young .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) :860-864
[34]   CRYPTANALYSIS OF AN EFFICIENT REMOTE USER AUTHENTICATION SCHEME WITH SMART CARDS [J].
Yeh, Kuo-Hui ;
Lo, Nai Wei ;
Winata, Enrico .
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (06) :2595-2608
[35]   An Efficient RSA-Based Remote User Authentication Scheme [J].
Shi, Wenbo ;
Chen, Yitao .
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY, 2012, 15 (03) :266-276
[36]   Efficient remote user authentication scheme using smart card [J].
Lu, RX ;
Cao, ZF .
COMPUTER NETWORKS, 2005, 49 (04) :535-540
[37]   Efficient remote user authentication scheme based on generalized ElGamal signature scheme [J].
Yoon, EJ ;
Ryu, EK ;
Yoo, KY .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :568-570
[38]   A ROBUST AUTHENTICATION SCHEME WITH USER ANONYMITY FOR WIRELESS ENVIRONMENTS [J].
Wang, Ren-Chiun ;
Juang, Wen-Shenq ;
Lei, Chin-Laung .
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (04) :1069-1080
[39]   A novel user authentication scheme with anonymity for wireless communications [J].
Niu, Jianwei ;
Li, Xiong .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (10) :1467-1476
[40]   Smart card based user authentication scheme with anonymity [J].
Truong, Toan-Thinh ;
Tran, Minh-Triet ;
Duong, Anh-Duc .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8860 :220-233