Cryptanalysis of two improved remote user authentication schemes preserving user anonymity

Seil Kim, Ji Young Chun, Dong Hoon Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)

    Abstract

    Lately, remote user authentication schemes using smart cards have been researched to provide user privacy. Previously provided schemes based on smart cards were only concerned about providing mutual authentication with key exchange, but the schemes preserving user anonymity have been recently demanded because the user privacy is an important issue in many e-commerce applications. In 2007, Hu et al. pointed out that Chien and Chen's scheme fails to protect the user anonymity and proposed a scheme preserving user anonymity. In 2008, Bindu et ah also pointed out Chien and Chen's scheme fails to protect the user anonymity and suggested a scheme preserving user anonymity. Unfortunately, neither scheme guarantee user anonymity against an insider adversary who is a legal user. In this paper, we first point out that both Hu et al. 's scheme and Bindu et al. 's scheme are still vulnerable to the insider attack. copy; 2008 IEEE.

    Original languageEnglish
    Title of host publicationProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008
    Pages2235-2239
    Number of pages5
    DOIs
    Publication statusPublished - 2008
    Event9th International Conference for Young Computer Scientists, ICYCS 2008 - Zhang Jia Jie, Hunan, China
    Duration: 2008 Nov 182008 Nov 21

    Publication series

    NameProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008

    Other

    Other9th International Conference for Young Computer Scientists, ICYCS 2008
    Country/TerritoryChina
    CityZhang Jia Jie, Hunan
    Period08/11/1808/11/21

    ASJC Scopus subject areas

    • Computational Theory and Mathematics
    • Computer Science Applications
    • Education

    Fingerprint

    Dive into the research topics of 'Cryptanalysis of two improved remote user authentication schemes preserving user anonymity'. Together they form a unique fingerprint.

    Cite this