Secure user-identification and key distribution scheme preserving anonymity

  • Authors:
  • S. Tripathy;S. Nandi

  • Affiliations:
  • ABV – Indian Institute of Information Technology and Management Gwalior, Morena Link Road, Gwalior, India.;Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati

  • Venue:
  • International Journal of Security and Networks
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

User-identification and key distribution with preserving anonymity is an important issue for remote access. Yang et al. proposed an efficient user identification and key distribution scheme preserving user anonymity. In this paper, we show the vulnerabilities of Yang's scheme against forgery and impersonation attacks. Further, we propose a highly secured protocol upholding the same properties.