Recently, Hsu and Chuang proposed an efficient user identification scheme with key preserving user anonymity for distributed computer networks. Their protocol addressed an identity disclosure attack on Yang et al. and Mangipudi-Katti schemes. Unfortunately, Hsu and Chuang’s new scheme posed vulnerability that the service provider could compute the private key of the user and imitate the user to send the service request to other service provider. In this paper, we analyzed Hsu-Chuang scheme and presented the vulnerability. We further secured their protocol by proposing a novel protocol that overcomes the above limitation while achieving the same security features. Besides, we made a demonstration of the correctness of our new scheme and anal...
At present, a number of users employ an authentication protocol so as to enjoy protected electronic ...
[[abstract]]Nowadays, multi-server remote user authentication schemes have been studied extensively ...
Abstract. In 2008, Wan et al. presented an anonymous ID-based group key agreement scheme for wireles...
In this paper, we analyzed Hsu-Chuang scheme and presented the vulnerability. We further secured the...
user identification, authentication, key agreement, anonymity, RSA, Denial-of-Service (DoS) attack A...
Apart from user identification and key distribution, it is very useful for the login process to achi...
[[abstract]]Many authentication and key agreement protocols were proposed for protecting communicate...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
Wu and Hsu proposed a variant user authentication with key agreement scheme, where both the identiti...
[[abstract]]In 2000, Lee and Chang proposed a user identi�cation scheme with key distribution preser...
[[abstract]]In a smart living environment, a person can use various intelligent devices to obtain hi...
匿名使用者認證及金鑰分配方法對於目前的分散式網路來說,可以說是相當的重要,因為這樣才能保護使用者資料的安全性與隱私性。在西元兩千年的時候,李維斌教授是第一個設計了能夠達到使用者認證與金鑰分配的方法;並...
We show that the Cherbal-Benchetioui key agreement scheme [Comput. Electr. Eng., 109, 108759 (2023)]...
Even though user anonymity is an important issue in many e-commerce applications, most of smartcard-...
At present, a number of users employ an authentication protocol so as to enjoy protected electronic ...
[[abstract]]Nowadays, multi-server remote user authentication schemes have been studied extensively ...
Abstract. In 2008, Wan et al. presented an anonymous ID-based group key agreement scheme for wireles...
In this paper, we analyzed Hsu-Chuang scheme and presented the vulnerability. We further secured the...
user identification, authentication, key agreement, anonymity, RSA, Denial-of-Service (DoS) attack A...
Apart from user identification and key distribution, it is very useful for the login process to achi...
[[abstract]]Many authentication and key agreement protocols were proposed for protecting communicate...
Copyright © 2014 Younsung Choi et al.This is an open access article distributed under the Creative C...
An anonymous user authentication scheme allows a user, who wants to access a remote application serv...
Wu and Hsu proposed a variant user authentication with key agreement scheme, where both the identiti...
[[abstract]]In 2000, Lee and Chang proposed a user identi�cation scheme with key distribution preser...
[[abstract]]In a smart living environment, a person can use various intelligent devices to obtain hi...
匿名使用者認證及金鑰分配方法對於目前的分散式網路來說,可以說是相當的重要,因為這樣才能保護使用者資料的安全性與隱私性。在西元兩千年的時候,李維斌教授是第一個設計了能夠達到使用者認證與金鑰分配的方法;並...
We show that the Cherbal-Benchetioui key agreement scheme [Comput. Electr. Eng., 109, 108759 (2023)]...
Even though user anonymity is an important issue in many e-commerce applications, most of smartcard-...
At present, a number of users employ an authentication protocol so as to enjoy protected electronic ...
[[abstract]]Nowadays, multi-server remote user authentication schemes have been studied extensively ...
Abstract. In 2008, Wan et al. presented an anonymous ID-based group key agreement scheme for wireles...