Cryptanalysis of two user identification schemes with key distribution preserving anonymity

  • Authors:
  • Eun-Jun Yoon;Kee-Young Yoo

  • Affiliations:
  • Department of Computer Engineering, Kyungpook National University, Daegu, South Korea;Department of Computer Engineering, Kyungpook National University, Daegu, South Korea

  • Venue:
  • ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In 2004, Wu-Hsu proposed an efficient identification scheme preserving anonymity. However, Yang et al. showed that Wu-Hsu’s scheme has a serious weakness, by which the service provider can learn the secret token of the user who requests services. To overcome this limitation, they further proposed a scheme to attain the same set of objectives as the previous works. Nevertheless, the two schemes still have other serious weaknesses. Accordingly, the current paper demonstrates the vulnerability of the two schemes. Furthermore, we present a method to avoid attack.