Browse > Article
http://dx.doi.org/10.9708/jksci.2010.15.12.109

An Efficient User Authentication Protocol using Smartcard  

Yong, Seung-Lim (인하공업전문대학 컴퓨터시스템과)
Cho, Tae-Nam (우석대학교 정보보안학과)
Abstract
Due to the increasing interest and demands of user privacy, remote user authentication schemes using smart card has been researched in active. Recently, a lot of suggestion have been made in order to provide user's anonymity and trace a malicious user. In 2008, Kim et al. proposed a traceable anonymity authentication scheme. In 2009, Choi et al. pointed out that Kim's protocol was insecure against outsider attacker and proposed an improved scheme. But Kim's and Choi's schemes fail to provide the user's anonymity or compute some values in the protocol. In this paper, we analyse those problems and suggest two improved schemes to resolve those problems.
Keywords
Remote User Authentication; SmartCard; Anonymity; Traceability;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 김세일, 천지영, 이동훈, "추적이 가능한 스마트카드 사용자 인증 기법", 한국정보보호학회논문지, 제 18권, 제 5호, pp. 31-39, 2008.   과학기술학회마을
2 최종석, 신승수, "사용자 익명성을 제공하는 추적 가능한 인증 프로토콜", 한국콘텐츠학회논문지, 제 9권, 제 4호, pp. 95-102, 2009.   과학기술학회마을   DOI   ScienceOn
3 H. Y. Chien and C. H. Chen, "A Remote Authentication Scheme Preserving User Anonymity", IEEE AINA'05, Vol. 2, pp. 245-248, 2005.
4 Z. Chai, Z. Cao and R. Lu, "Efficient Password -Based Authentication and Key Exchange Scheme Preserving User Privacy", WASA'06, LNCS 4138, pp. 467-477, 2006.
5 M. L. Das, A. Saxena, and V. P. Gulati, "A Dynamic ID-based Remote User Authentication Scheme", IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 629-631, 2004.   DOI   ScienceOn
6 L. Lamport, "Password Authentication with Insecure Communication", Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1981.   DOI   ScienceOn