An Improved Bilateral Remote User Authentication Scheme that Preserves User Anonymity using Symmetric Cryptology

被引:1
作者
Cho, Jung Gil [1 ]
Huh, Won Whoi [1 ]
机构
[1] SungKyul Univ, Div Comp Engn, Anyang 430742, Gyeonggi do, South Korea
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2014年 / 8卷 / 06期
关键词
bilateral authentication; smart card; symmetric cryptology; anonymity;
D O I
10.14257/ijsia.2014.8.6.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent 2012, Wen and Li.'s has presented a dynamic ID-based remote user authentication with key agreement scheme. They claimed that their scheme can resisted insider attack and provide anonymity for the users. However, Juan Qu and Li-min Zou., described that Wen and Li.'s scheme could not withstand insider attack, does not provide anonymity for the users, and inefficiency for error password login. A different approach to symmetric cryptology is taken in this study to resolve the fore was made Compared to Juan Qu and Li-min Zou scheme, a different approach was made with symmetric cryptology in this study to supplement the forementioned weak points. We propose an enhanced authentication scheme, which covers all the identified weakness of Wen and Li.'s scheme and an efficient user authentication scheme that preserve perfect anonymity to both the outsider and remote server.
引用
收藏
页码:127 / 136
页数:10
相关论文
共 16 条
[1]  
Chen CM, 2002, IEICE T COMMUN, VE85B, P2519
[2]  
Cheng-Chi Lee, 2002, Operating Systems Review, V36, P23, DOI 10.1145/583800.583803
[3]   A dynamic ID-based remote user authentication scheme [J].
Das, ML ;
Saxena, A ;
Gulati, VP .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (02) :629-631
[4]   Robust remote authentication scheme with smart cards [J].
Fan, CI ;
Chan, YC ;
Zhang, ZK .
COMPUTERS & SECURITY, 2005, 24 (08) :619-628
[5]   A new remote user authentication scheme using smart cards [J].
Hwang, MS ;
Li, LH .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :28-30
[6]   Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' [J].
Khan, Muhammad Khurram ;
Kim, Soo-Kyun ;
Alghathbar, Khaled .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :305-309
[7]  
Kim M., 2012, LNEE, V203, P687
[8]   PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1981, 24 (11) :770-772
[9]   Improved remote authentication scheme with smart card [J].
Lee, NY ;
Chiu, YC .
COMPUTER STANDARDS & INTERFACES, 2005, 27 (02) :177-180
[10]  
Liao I. E., 2005, KOREA INT C NEXT GEN