English  |  正體中文  |  简体中文  |  Items with full text/Total items : 51510/86705 (59%)
Visitors : 8276539      Online Users : 93
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/59846


    Title: A Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards
    Authors: Horng, Wen-Bing;Lee, Cheng-Ping;Peng, Jian-Wen
    Contributors: 淡江大學資訊工程學系
    Keywords: Anonymity;Non-tamper resistant;Cryptanalysis;Remote authentication;Smart card
    Date: 2010-05
    Issue Date: 2011-10-05 22:20:48 (UTC+8)
    Publisher: Zographou: World Scientific and Engineering Academy and Society (W S E A S)
    Abstract: Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Besides, it can avoid unauthorized entities from using the user ID and other intercepted information to forge legal login messages. In 2004, Das et al. first proposed a remote user authentication scheme with smart cards using dynamic ID to protect user anonymity. Later, in 2005, Chien and Chen demonstrated that Das et al.'s scheme fails to preserve user anonymity and then presented a new scheme to remedy this problem. In 2007, Hu et al. pointed out that Chien-Chen's scheme cannot preserve user anonymity if the smart card is nontamper resistant; i.e., the secret information stored in the smart card can be revealed. They then proposed an improved scheme to cope with this problem. In this paper, however, we will show that Hu et al.'s scheme still cannot preserve user anonymity under their assumption. In addition, their scheme is also vulnerable to the offline password guessing attack. We then present an improvement to overcome these weaknesses, while preserving all the merits of their scheme.
    Relation: WSEAS Transactions on Information Science and Applications 7(5), pp.619-628
    Appears in Collections:[資訊工程學系暨研究所] 期刊論文

    Files in This Item:

    File SizeFormat
    1790-0832_7(5)_p619-628.pdf714KbAdobe PDF130View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback