원문정보
초록
영어
In recent 2012, Wen and Li.'s has presented a dynamic ID-based remote user authentication with key agreement scheme. They claimed that their scheme can resisted insider attack and provide anonymity for the users. However, Juan Qu and Li-min Zou., described that Wen and Li.'s scheme could not withstand insider attack, does not provide anonymity for the users, and inefficiency for error password login. A different approach to symmetric cryptology is taken in this study to resolve the fore was made Compared to Juan Qu and Li-min Zou scheme, a different approach was made with symmetric cryptology in this study to supplement the forementioned weak points. We propose an enhanced authentication scheme, which covers all the identified weakness of Wen and Li.'s scheme and an efficient user authentication scheme that preserve perfect anonymity to both the outsider and remote server.
목차
1. Introduction
2. Review of Wen and Li’s Authentication Scheme
3. Security Weakness of Wen and Li’s Scheme
3.1 Weakness of Anonymity by Tracing
3.2. Privileged Insider Attack
3.3. Inefficiency for Error Password
4. Description of the Proposed Authentication Scheme
5. Security Analysis of the Proposed Scheme
6. Performance Comparison
7. Conclusion
References
