Cryptanalysis of two improved remote user authentication schemes preserving user anonymity

Seil Kim, Ji Young Chun, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Lately, remote user authentication schemes using smart cards have been researched to provide user privacy. Previously provided schemes based on smart cards were only concerned about providing mutual authentication with key exchange, but the schemes preserving user anonymity have been recently demanded because the user privacy is an important issue in many e-commerce applications. In 2007, Hu et al. pointed out that Chien and Chen's scheme fails to protect the user anonymity and proposed a scheme preserving user anonymity. In 2008, Bindu et ah also pointed out Chien and Chen's scheme fails to protect the user anonymity and suggested a scheme preserving user anonymity. Unfortunately, neither scheme guarantee user anonymity against an insider adversary who is a legal user. In this paper, we first point out that both Hu et al. 's scheme and Bindu et al. 's scheme are still vulnerable to the insider attack. copy; 2008 IEEE.

Original languageEnglish
Title of host publicationProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008
Pages2235-2239
Number of pages5
DOIs
Publication statusPublished - 2008 Dec 1
Event9th International Conference for Young Computer Scientists, ICYCS 2008 - Zhang Jia Jie, Hunan, China
Duration: 2008 Nov 182008 Nov 21

Other

Other9th International Conference for Young Computer Scientists, ICYCS 2008
CountryChina
CityZhang Jia Jie, Hunan
Period08/11/1808/11/21

Fingerprint

Smart cards
anonymity
Authentication
privacy
electronic business
guarantee

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Education

Cite this

Kim, S., Chun, J. Y., & Lee, D. H. (2008). Cryptanalysis of two improved remote user authentication schemes preserving user anonymity. In Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008 (pp. 2235-2239). [4709320] https://doi.org/10.1109/ICYCS.2008.64

Cryptanalysis of two improved remote user authentication schemes preserving user anonymity. / Kim, Seil; Chun, Ji Young; Lee, Dong Hoon.

Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. 2008. p. 2235-2239 4709320.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, S, Chun, JY & Lee, DH 2008, Cryptanalysis of two improved remote user authentication schemes preserving user anonymity. in Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008., 4709320, pp. 2235-2239, 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, 08/11/18. https://doi.org/10.1109/ICYCS.2008.64
Kim S, Chun JY, Lee DH. Cryptanalysis of two improved remote user authentication schemes preserving user anonymity. In Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. 2008. p. 2235-2239. 4709320 https://doi.org/10.1109/ICYCS.2008.64
Kim, Seil ; Chun, Ji Young ; Lee, Dong Hoon. / Cryptanalysis of two improved remote user authentication schemes preserving user anonymity. Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. 2008. pp. 2235-2239
@inproceedings{476931a84e414ada836bcbd9ea8667d1,
title = "Cryptanalysis of two improved remote user authentication schemes preserving user anonymity",
abstract = "Lately, remote user authentication schemes using smart cards have been researched to provide user privacy. Previously provided schemes based on smart cards were only concerned about providing mutual authentication with key exchange, but the schemes preserving user anonymity have been recently demanded because the user privacy is an important issue in many e-commerce applications. In 2007, Hu et al. pointed out that Chien and Chen's scheme fails to protect the user anonymity and proposed a scheme preserving user anonymity. In 2008, Bindu et ah also pointed out Chien and Chen's scheme fails to protect the user anonymity and suggested a scheme preserving user anonymity. Unfortunately, neither scheme guarantee user anonymity against an insider adversary who is a legal user. In this paper, we first point out that both Hu et al. 's scheme and Bindu et al. 's scheme are still vulnerable to the insider attack. copy; 2008 IEEE.",
author = "Seil Kim and Chun, {Ji Young} and Lee, {Dong Hoon}",
year = "2008",
month = "12",
day = "1",
doi = "10.1109/ICYCS.2008.64",
language = "English",
isbn = "9780769533988",
pages = "2235--2239",
booktitle = "Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008",

}

TY - GEN

T1 - Cryptanalysis of two improved remote user authentication schemes preserving user anonymity

AU - Kim, Seil

AU - Chun, Ji Young

AU - Lee, Dong Hoon

PY - 2008/12/1

Y1 - 2008/12/1

N2 - Lately, remote user authentication schemes using smart cards have been researched to provide user privacy. Previously provided schemes based on smart cards were only concerned about providing mutual authentication with key exchange, but the schemes preserving user anonymity have been recently demanded because the user privacy is an important issue in many e-commerce applications. In 2007, Hu et al. pointed out that Chien and Chen's scheme fails to protect the user anonymity and proposed a scheme preserving user anonymity. In 2008, Bindu et ah also pointed out Chien and Chen's scheme fails to protect the user anonymity and suggested a scheme preserving user anonymity. Unfortunately, neither scheme guarantee user anonymity against an insider adversary who is a legal user. In this paper, we first point out that both Hu et al. 's scheme and Bindu et al. 's scheme are still vulnerable to the insider attack. copy; 2008 IEEE.

AB - Lately, remote user authentication schemes using smart cards have been researched to provide user privacy. Previously provided schemes based on smart cards were only concerned about providing mutual authentication with key exchange, but the schemes preserving user anonymity have been recently demanded because the user privacy is an important issue in many e-commerce applications. In 2007, Hu et al. pointed out that Chien and Chen's scheme fails to protect the user anonymity and proposed a scheme preserving user anonymity. In 2008, Bindu et ah also pointed out Chien and Chen's scheme fails to protect the user anonymity and suggested a scheme preserving user anonymity. Unfortunately, neither scheme guarantee user anonymity against an insider adversary who is a legal user. In this paper, we first point out that both Hu et al. 's scheme and Bindu et al. 's scheme are still vulnerable to the insider attack. copy; 2008 IEEE.

UR - http://www.scopus.com/inward/record.url?scp=58349118942&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=58349118942&partnerID=8YFLogxK

U2 - 10.1109/ICYCS.2008.64

DO - 10.1109/ICYCS.2008.64

M3 - Conference contribution

AN - SCOPUS:58349118942

SN - 9780769533988

SP - 2235

EP - 2239

BT - Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008

ER -