An efficient remote user authentication scheme with strong anonymity

Liu Yanfei, Zhao Ziming, Li Hui, Luo Qun, Yang Yixian

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Recently, many remote authentication schemes attempt to preserve user anonymity from the eavesdropper. However, authentication schemes in many e-commerce transactions require not only anonymous to the eavesdropper but also to the authentication server. In this paper, we propose a remote authentication scheme using smart card to fulfill both of the requirements. The proposed scheme achieves mutual authentication and allows users to choose and change their own passwords freely and securely. We only use one-way hash function and bitwise XOR operation in the proposed scheme and so the scheme has a low computational complexity. By using timestamp and random numbers, the proposed scheme can resist the denial of service attack and the replay attack. Also, the scheme is secure against guessing attack, insider attack, stolen-verifier attack, reflection attack, and impersonation attack.

Original languageEnglish (US)
Title of host publicationProceedings of the 2008 International Conference on Cyberworlds, CW 2008
Pages180-185
Number of pages6
DOIs
StatePublished - Dec 1 2008
Event2008 International Conference on Cyberworlds, CW 2008 - Hangzhou, China
Duration: Sep 22 2008Sep 24 2008

Publication series

NameProceedings of the 2008 International Conference on Cyberworlds, CW 2008

Other

Other2008 International Conference on Cyberworlds, CW 2008
CountryChina
CityHangzhou
Period9/22/089/24/08

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Vision and Pattern Recognition

Fingerprint Dive into the research topics of 'An efficient remote user authentication scheme with strong anonymity'. Together they form a unique fingerprint.

  • Cite this

    Yanfei, L., Ziming, Z., Hui, L., Qun, L., & Yixian, Y. (2008). An efficient remote user authentication scheme with strong anonymity. In Proceedings of the 2008 International Conference on Cyberworlds, CW 2008 (pp. 180-185). [4741297] (Proceedings of the 2008 International Conference on Cyberworlds, CW 2008). https://doi.org/10.1109/CW.2008.23