Anonymous and traceable authentication scheme using smart cards

Seil Kim, Hyun Sook Rhee, Ji Young Chun, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Abstract

Recently, remote user authentication schemes using smart cards has been researched to provide user privacy because of increasing interest and demands. Previously, provided authentication schemes were only concerned about providing user privacy against outside attackers, but the scheme, which guarantees user privacy against both a remote server and outside attackers, has been recently demanded because the user's information has leaked out through the service providers. When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency. In this paper, we suggest a scheme which not only guarantees user privacy against both a remote server and outside attackers, but also provides traceable anonymity authentication.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
Pages162-165
Number of pages4
DOIs
Publication statusPublished - 2008 Sep 15
Event2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, Korea, Republic of
Duration: 2008 Apr 242008 Apr 26

Other

Other2nd International Conference on Information Security and Assurance, ISA 2008
CountryKorea, Republic of
CityBusan
Period08/4/2408/4/26

Fingerprint

Smart cards
Authentication
Servers
privacy
guarantee
Smart card
anonymity
service provider
Privacy

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management
  • Electrical and Electronic Engineering
  • Communication

Cite this

Kim, S., Rhee, H. S., Chun, J. Y., & Lee, D. H. (2008). Anonymous and traceable authentication scheme using smart cards. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008 (pp. 162-165). [4511555] https://doi.org/10.1109/ISA.2008.52

Anonymous and traceable authentication scheme using smart cards. / Kim, Seil; Rhee, Hyun Sook; Chun, Ji Young; Lee, Dong Hoon.

Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 162-165 4511555.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, S, Rhee, HS, Chun, JY & Lee, DH 2008, Anonymous and traceable authentication scheme using smart cards. in Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008., 4511555, pp. 162-165, 2nd International Conference on Information Security and Assurance, ISA 2008, Busan, Korea, Republic of, 08/4/24. https://doi.org/10.1109/ISA.2008.52
Kim S, Rhee HS, Chun JY, Lee DH. Anonymous and traceable authentication scheme using smart cards. In Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. p. 162-165. 4511555 https://doi.org/10.1109/ISA.2008.52
Kim, Seil ; Rhee, Hyun Sook ; Chun, Ji Young ; Lee, Dong Hoon. / Anonymous and traceable authentication scheme using smart cards. Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. 2008. pp. 162-165
@inproceedings{1a3d1cf60ced42cf8e3d7579bf9a8e36,
title = "Anonymous and traceable authentication scheme using smart cards",
abstract = "Recently, remote user authentication schemes using smart cards has been researched to provide user privacy because of increasing interest and demands. Previously, provided authentication schemes were only concerned about providing user privacy against outside attackers, but the scheme, which guarantees user privacy against both a remote server and outside attackers, has been recently demanded because the user's information has leaked out through the service providers. When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency. In this paper, we suggest a scheme which not only guarantees user privacy against both a remote server and outside attackers, but also provides traceable anonymity authentication.",
author = "Seil Kim and Rhee, {Hyun Sook} and Chun, {Ji Young} and Lee, {Dong Hoon}",
year = "2008",
month = "9",
day = "15",
doi = "10.1109/ISA.2008.52",
language = "English",
isbn = "9780769531267",
pages = "162--165",
booktitle = "Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008",

}

TY - GEN

T1 - Anonymous and traceable authentication scheme using smart cards

AU - Kim, Seil

AU - Rhee, Hyun Sook

AU - Chun, Ji Young

AU - Lee, Dong Hoon

PY - 2008/9/15

Y1 - 2008/9/15

N2 - Recently, remote user authentication schemes using smart cards has been researched to provide user privacy because of increasing interest and demands. Previously, provided authentication schemes were only concerned about providing user privacy against outside attackers, but the scheme, which guarantees user privacy against both a remote server and outside attackers, has been recently demanded because the user's information has leaked out through the service providers. When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency. In this paper, we suggest a scheme which not only guarantees user privacy against both a remote server and outside attackers, but also provides traceable anonymity authentication.

AB - Recently, remote user authentication schemes using smart cards has been researched to provide user privacy because of increasing interest and demands. Previously, provided authentication schemes were only concerned about providing user privacy against outside attackers, but the scheme, which guarantees user privacy against both a remote server and outside attackers, has been recently demanded because the user's information has leaked out through the service providers. When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency. In this paper, we suggest a scheme which not only guarantees user privacy against both a remote server and outside attackers, but also provides traceable anonymity authentication.

UR - http://www.scopus.com/inward/record.url?scp=51349141735&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=51349141735&partnerID=8YFLogxK

U2 - 10.1109/ISA.2008.52

DO - 10.1109/ISA.2008.52

M3 - Conference contribution

AN - SCOPUS:51349141735

SN - 9780769531267

SP - 162

EP - 165

BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

ER -