TY - GEN
T1 - An exquisite authentication scheme with key agreement preserving user anonymity
AU - Kim, Mijin
AU - Kim, Seungjoo
AU - Won, Dongho
PY - 2010
Y1 - 2010
N2 - In 2009, Liao et al. proposed an exquisite mutual authentication scheme with key agreement using smart cards to access a network system legally and securely. Liao et al.'s scheme adopted a transformed identity (TID) to avoid identity duplication. However, we find out that an adversary may exploit TID to achieve offline guessing attack. Liao et al.'s scheme is also exposed to man-in-the-middle attack and their claimed theorems and proofs are incorrect. We conduct detailed analysis of flaws in the scheme and its security proof. This paper proposes an improved scheme to overcome these problems and preserve user anonymity that is an issue in e-commerce applications.
AB - In 2009, Liao et al. proposed an exquisite mutual authentication scheme with key agreement using smart cards to access a network system legally and securely. Liao et al.'s scheme adopted a transformed identity (TID) to avoid identity duplication. However, we find out that an adversary may exploit TID to achieve offline guessing attack. Liao et al.'s scheme is also exposed to man-in-the-middle attack and their claimed theorems and proofs are incorrect. We conduct detailed analysis of flaws in the scheme and its security proof. This paper proposes an improved scheme to overcome these problems and preserve user anonymity that is an issue in e-commerce applications.
KW - Key agreement
KW - Mutual authentication
KW - Transformed identity
KW - User anonymity
UR - http://www.scopus.com/inward/record.url?scp=78649524257&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-16515-3_31
DO - 10.1007/978-3-642-16515-3_31
M3 - Conference contribution
AN - SCOPUS:78649524257
SN - 3642165141
SN - 9783642165146
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 244
EP - 253
BT - Web Information Systems and Mining - International Conference, WISM 2010, Proceedings
T2 - 2010 International Conference on Web Information Systems and Mining, WISM 2010
Y2 - 23 October 2010 through 24 October 2010
ER -