A remote user authentication scheme preserving user anonymity and traceability
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
WSEAS Transactions on Information Science and Applications
Anonymous password-based key exchange with low resources consumption and better user-friendliness
Security and Communication Networks
Journal of Computer and System Sciences
Hi-index | 0.00 |
Recently, remote user authentication schemes using smart cards has been researched to provide user privacy because of increasing interest and demands. Previously, provided authentication schemes were only concerned about providing user privacy against outside attackers, but the scheme, which guarantees user privacy against both a remote server and outside attackers, has been recently demanded because the user's information has leaked out through the service providers. When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency. In this paper, we suggest a scheme which not only guarantees user privacy against both a remote server and outside attackers, but also provides traceable anonymity authentication.