Advertisement

Retracted: An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard

  • Kyung-kug Kim
  • Myung-Hwan Kim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7839)

Abstract

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.’s scheme did not provide the user anonymity. Then, they presented an anonymous authenticated key exchange protocol using smart cards in 2008. They argued that their scheme provided identity privacy, mutual authentication, and half-forward secrecy. In 2009, however, Lee et al. showed that Juang et al.’s scheme is not secure against stolen-verifier attack. Moreover, Juang’s scheme does not satisfy the user anonymity. To solve this problem, we proposed an improved anonymous authentication and key exchange scheme. Then, we show that the proposed scheme is secure against various well-known attacks.

Keywords

anonymous user authentication password key exchange protocol 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770–772 (1981)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Awasthi, A., Lal, S.: A remote user authentication scheme using smart cards with forward secrecy. IEEE Trans. Consumer Electronic 49(4), 1246–1248 (2003)CrossRefGoogle Scholar
  3. 3.
    Awasthi, A., Lal, S.: An enhanced remote user authentication scheme using smart cards. IEEE Trans. Consumer Electronic 50(2), 583–586 (2004)CrossRefGoogle Scholar
  4. 4.
    Juang, W.: Efficient password authenticated key agreement using smart card. Computers & Security 23, 167–173 (2004)CrossRefGoogle Scholar
  5. 5.
    Ku, W., Chen, S.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consumer Electronic 50(1), 204–207 (2004)CrossRefGoogle Scholar
  6. 6.
    Kumar, M.: New remote user authentication scheme using smart cards. IEEE Trans. Consumer Electronic 50(2), 597–600 (2004)CrossRefGoogle Scholar
  7. 7.
    Kwon, T., Park, Y., Lee, H.: Security analysis and improvement of the efficient password-based authentication protocol. IEEE Communications Letters 9(1), 93–95 (2005)Google Scholar
  8. 8.
    Park, Y., Park, S.: Two factor authenticated key exchange (TAKE) protocol in public wireless LANs. IEICE Trans. Communications E87-B(5), 1382–1385 (2004)Google Scholar
  9. 9.
    Sun, H.: An efficient use authentication scheme using smart cards. IEEE Trans. Consumer Electronic 46(4), 958–961 (2000)CrossRefGoogle Scholar
  10. 10.
    Wang, X., Zhang, W., Zhang, J., Khan, M.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards & Interfaces 29(5), 507–512 (2007)CrossRefGoogle Scholar
  11. 11.
    Yang, C., Hwang, M.: Cryptanalysis of simple authenticated key agreement protocols. IEICE Trans. Communications E87-A(8), 2174–2176 (2004)Google Scholar
  12. 12.
    Yang, C., Wang, R.: Cryptanalysis of a user friendly remote authentication scheme with smart cards. Computer Security 23, 425–427 (2004)CrossRefGoogle Scholar
  13. 13.
    Chai, Z., Cao, Z., Lu, R.: Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. In: Cheng, X., Li, W., Znati, T. (eds.) WASA 2006. LNCS, vol. 4138, pp. 467–477. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Park, Y.M., Park, S.K.: Two factor authenticated key exchange(TAKE) protocol in public wireless LANs. IEICE Trans. Communications E87-B(5), 1382–1385 (2004)Google Scholar
  15. 15.
    Juang, W.-S., Wu, J.-L.: Two efficient two-factor authenticated key exchange protocols in public wireless LANs. Computers and Electrical Engineering 10, 1–8 (2008)Google Scholar
  16. 16.
    Yeh, T.-C., Shen, H.-Y., Hwang, J.-J.: A Secure One-Time Password Authentication Scheme Using Smart Cards E85-B(11), 2515–2518 (2002)Google Scholar
  17. 17.
    Lee, H., Choi, D., Lee, Y., Won, D., Kim, S.: Cryptanalysis of Two-Factor Authenticated Key Exchange Protocol in Wireless LANs. World Academy of Science, Engineering and Technology 59, 390–393 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Kyung-kug Kim
    • 1
  • Myung-Hwan Kim
    • 1
  1. 1.ISaC and Department of Mathematical SciencesSeoul National UniversitySeoulKorea

Personalised recommendations