Cryptanalysis of two improved remote user authentication schemes preserving user anonymity

Seil Kim, Ji Young Chun, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Lately, remote user authentication schemes using smart cards have been researched to provide user privacy. Previously provided schemes based on smart cards were only concerned about providing mutual authentication with key exchange, but the schemes preserving user anonymity have been recently demanded because the user privacy is an important issue in many e-commerce applications. In 2007, Hu et al. pointed out that Chien and Chen's scheme fails to protect the user anonymity and proposed a scheme preserving user anonymity. In 2008, Bindu et ah also pointed out Chien and Chen's scheme fails to protect the user anonymity and suggested a scheme preserving user anonymity. Unfortunately, neither scheme guarantee user anonymity against an insider adversary who is a legal user. In this paper, we first point out that both Hu et al. 's scheme and Bindu et al. 's scheme are still vulnerable to the insider attack. copy; 2008 IEEE.

Original languageEnglish
Title of host publicationProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008
Pages2235-2239
Number of pages5
DOIs
Publication statusPublished - 2008
Event9th International Conference for Young Computer Scientists, ICYCS 2008 - Zhang Jia Jie, Hunan, China
Duration: 2008 Nov 182008 Nov 21

Publication series

NameProceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008

Other

Other9th International Conference for Young Computer Scientists, ICYCS 2008
Country/TerritoryChina
CityZhang Jia Jie, Hunan
Period08/11/1808/11/21

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications
  • Education

Fingerprint

Dive into the research topics of 'Cryptanalysis of two improved remote user authentication schemes preserving user anonymity'. Together they form a unique fingerprint.

Cite this