Password authentication with insecure communication
Communications of the ACM
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
Two efficient two-factor authenticated key exchange protocols in public wireless LANs
Computers and Electrical Engineering
Efficient password-based authentication and key exchange scheme preserving user privacy
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
A remote user authentication scheme using smart cards with forward secrecy
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
An enhanced remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
New remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user anonymity. Then, they presented an anonymous authenticated key exchange protocol using smart cards in 2008. They argued that their scheme provided identity privacy, mutual authentication, and half-forward secrecy. In 2009, however, Lee et al. showed that Juang et al.'s scheme is not secure against stolen-verifier attack. Moreover, Juang's scheme does not satisfy the user anonymity. To solve this problem, we proposed an improved anonymous authentication and key exchange scheme. Then, we show that the proposed scheme is secure against various well-known attacks.