淡江大學機構典藏:Item 987654321/59846
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62805/95882 (66%)
Visitors : 3949617      Online Users : 1036
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/59846


    Title: A Secure Remote Authentication Scheme Preserving User Anonymity with Non-Tamper Resistant Smart Cards
    Authors: Horng, Wen-Bing;Lee, Cheng-Ping;Peng, Jian-Wen
    Contributors: 淡江大學資訊工程學系
    Keywords: Anonymity;Non-tamper resistant;Cryptanalysis;Remote authentication;Smart card
    Date: 2010-05
    Issue Date: 2011-10-05 22:20:48 (UTC+8)
    Publisher: Zographou: World Scientific and Engineering Academy and Society (W S E A S)
    Abstract: Anonymity is one of the important properties of remote authentication schemes to preserve user privacy. Besides, it can avoid unauthorized entities from using the user ID and other intercepted information to forge legal login messages. In 2004, Das et al. first proposed a remote user authentication scheme with smart cards using dynamic ID to protect user anonymity. Later, in 2005, Chien and Chen demonstrated that Das et al.'s scheme fails to preserve user anonymity and then presented a new scheme to remedy this problem. In 2007, Hu et al. pointed out that Chien-Chen's scheme cannot preserve user anonymity if the smart card is nontamper resistant; i.e., the secret information stored in the smart card can be revealed. They then proposed an improved scheme to cope with this problem. In this paper, however, we will show that Hu et al.'s scheme still cannot preserve user anonymity under their assumption. In addition, their scheme is also vulnerable to the offline password guessing attack. We then present an improvement to overcome these weaknesses, while preserving all the merits of their scheme.
    Relation: WSEAS Transactions on Information Science and Applications 7(5), pp.619-628
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Journal Article

    Files in This Item:

    File SizeFormat
    1790-0832_7(5)_p619-628.pdf714KbAdobe PDF233View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback