Anonymous and traceable authentication scheme using smart cards

Seil Kim, Hyun Sook Rhee, Ji Young Chun, Dong Hoon Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)

    Abstract

    Recently, remote user authentication schemes using smart cards has been researched to provide user privacy because of increasing interest and demands. Previously, provided authentication schemes were only concerned about providing user privacy against outside attackers, but the scheme, which guarantees user privacy against both a remote server and outside attackers, has been recently demanded because the user's information has leaked out through the service providers. When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency. In this paper, we suggest a scheme which not only guarantees user privacy against both a remote server and outside attackers, but also provides traceable anonymity authentication.

    Original languageEnglish
    Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
    Pages162-165
    Number of pages4
    DOIs
    Publication statusPublished - 2008
    Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
    Duration: 2008 Apr 242008 Apr 26

    Publication series

    NameProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

    Other

    Other2nd International Conference on Information Security and Assurance, ISA 2008
    Country/TerritoryKorea, Republic of
    CityBusan
    Period08/4/2408/4/26

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Information Systems and Management
    • Electrical and Electronic Engineering
    • Communication

    Fingerprint

    Dive into the research topics of 'Anonymous and traceable authentication scheme using smart cards'. Together they form a unique fingerprint.

    Cite this