A remote user authentication scheme preserving user anonymity and traceability

  • Authors:
  • Shuai Shao;Hui Li;Xinxi Niu;Yixian Yang

  • Affiliations:
  • Inf. Sec. Center, State Key Lab. of Networking and Switching Techn., Key Lab. of Network and Inf. Attack & Defence Techn. of MOE, National Eng. Lab. for Disaster Backup and Recovery, Beijing Univ. ...;Inf. Sec. Center, State Key Lab. of Networking and Switching Techn., Key Lab. of Network and Inf. Attack & Defence Techn. of MOE, Natl. Eng. Lab. for Disaster Backup and Recovery, Beijing Univ. of ...;Inf. Sec. Center, State Key Lab. of Networking and Switching Techn., Key Lab. of Network and Inf. Attack & Defence Techn. of MOE, Natl. Eng. Lab. for Disaster Backup and Recovery, Beijing Univ. of ...;Inf. Sec. Center, State Key Lab. of Networking and Switching Techn., Key Lab. of Network and Inf. Attack & Defence Techn. of MOE, Natl. Eng. Lab. for Disaster Backup and Recovery, Beijing Univ. of ...

  • Venue:
  • WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many smart card based remote authentication schemes have been proposed to preserve user privacy against eavesdropper. However, none of the exiting scheme provides both users' anonymity to server and traceability to the malicious user. In this paper, we present a scheme that preserve user anonymity not only against outside attackers, but also against the remote server. When a malicious user was found, server can trace the user with the help of the trusted third party.