An Efficient Remote User Authentication Scheme with Strong Anonymity

被引:2
作者
Liu, Yanfei [1 ]
Zhao, Ziming [1 ]
Li, Hui [1 ]
Luo, Qun [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON CYBERWORLDS | 2008年
关键词
D O I
10.1109/CW.2008.23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, many remote authentication schemes attempt to preserve user anonymity from the eavesdropper. However, authentication schemes in many e-commerce transactions require not only anonymous to the eavesdropper but also to the authentication server. In this paper, we propose a remote authentication scheme using smart card to fulfill both of the requirements. The proposed scheme achieves mutual authentication and allows users to choose and change their own passwords freely and securely. We only use one-way hash function and bitwise XOR operation in the proposed scheme and so the scheme has a low computational complexity. By using timestamp and random numbers, the proposed scheme can resist the denial of service attack and the replay attack. Also, the scheme is secure against guessing attack, insider attack, stolen-verifier attack, reflection attack, and impersonation attack.
引用
收藏
页码:180 / 185
页数:6
相关论文
共 50 条
[41]   Smart Card Based User Authentication Scheme with Anonymity [J].
Toan-Thinh Truong ;
Minh-Triet Tran ;
Anh-Duc Duong .
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2014, 2014, 8860 :220-233
[42]   A user friendly authentication scheme with anonymity for wireless communications [J].
Yoon, Eun-Jun ;
Yoo, Kee-Young ;
Ha, Keum-Sook .
COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (03) :356-364
[43]   User authentication scheme preserving anonymity for ubiquitous devices [J].
Djellali, Benchaa ;
Belarbi, Kheira ;
Chouarfia, Abdallah ;
Lorenz, Pascal .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) :3131-3141
[44]   An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city [J].
Li, Xiong ;
Sangaiah, Arun Kumar ;
Kumari, Saru ;
Wu, Fan ;
Shen, Jian ;
Khan, Muhammad Khurram .
PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) :791-805
[45]   An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city [J].
Xiong Li ;
Arun Kumar Sangaiah ;
Saru Kumari ;
Fan Wu ;
Jian Shen ;
Muhammad Khurram Khan .
Personal and Ubiquitous Computing, 2017, 21 :791-805
[46]   A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS [J].
Li, Chun-Ta .
INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01) :69-76
[47]   A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Wen, Fengtong .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (06)
[48]   A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Fengtong Wen .
Journal of Medical Systems, 2013, 37
[49]   An Improved User Authentication and Key Agreement Scheme Providing User Anonymity [J].
Ya-Fen Chang and Pei-Yu Chang Department of Computer Science and Information Engineering ;
National Taichung Institute of Technology .
JournalofElectronicScienceandTechnology, 2011, 9 (04) :352-358
[50]   Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications [J].
Yoon, Eun-Jun ;
Yoo, Kee-Young .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06) :1687-1689