earticle

논문검색

An Improved Bilateral Remote User Authentication Scheme that Preserves User Anonymity using Symmetric Cryptology

초록

영어

In recent 2012, Wen and Li.'s has presented a dynamic ID-based remote user authentication with key agreement scheme. They claimed that their scheme can resisted insider attack and provide anonymity for the users. However, Juan Qu and Li-min Zou., described that Wen and Li.'s scheme could not withstand insider attack, does not provide anonymity for the users, and inefficiency for error password login. A different approach to symmetric cryptology is taken in this study to resolve the fore was made Compared to Juan Qu and Li-min Zou scheme, a different approach was made with symmetric cryptology in this study to supplement the forementioned weak points. We propose an enhanced authentication scheme, which covers all the identified weakness of Wen and Li.'s scheme and an efficient user authentication scheme that preserve perfect anonymity to both the outsider and remote server.

목차

Abstract
 1. Introduction
 2. Review of Wen and Li’s Authentication Scheme
 3. Security Weakness of Wen and Li’s Scheme
  3.1 Weakness of Anonymity by Tracing
  3.2. Privileged Insider Attack
  3.3. Inefficiency for Error Password
 4. Description of the Proposed Authentication Scheme
 5. Security Analysis of the Proposed Scheme
 6. Performance Comparison
 7. Conclusion
 References

저자정보

  • Jung Gil Cho Division of Computer Engineering, SungKyul University, SungKyul University ro, Manan gu, Anyang si, Gyeonggi do, Republic of Korea
  • Won Whoi Huh Division of Multimedia Engineering, SungKyul University, SungKyul University ro, Manan gu, Anyang si, Gyeonggi do, Republic of Korea(Zip code 430-742)

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.