Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.5.31

Anonymity User Authentication Scheme with Smart Cards preserving Traceability  

Kim, Se-Il (Graduate School of Information Management and Security, Korea University)
Chun, Ji-Young (Graduate School of Information Management and Security, Korea University)
Lee, Dong-Hoon (Graduate School of Information Management and Security, Korea University)
Abstract
Recently, remote user authentication schemes using smart cards has been researched to provide user privacy because of increasing interest and demands. Previously, provided authentication schemes were only concerned about providing user privacy against outside attackers, but the scheme. which guarantees user privacy against both a remote server and outside attackers, has been recently demanded because the user's information has leaked out through the service providers. When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency. In this paper, we suggest a scheme which not only guarantees user privacy against both a remote server and outside attackers, but also provides traceable anonymity authentication.
Keywords
Traceability; Privacy; Smart Card; Anonymity; Mutual Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H.M. Qiu, Y.X. Yang, and Z.M. Hu, A new mutual user authentication scheme using smart card, Application Research of Computers, No. 12, pp. 103-105, 2005
2 L. Lamport, Password authentication with insecure communication, Communications of the ACM, Vol.24, No.11, pp. 770-772, 1981   DOI   ScienceOn
3 Z. Chai, Z. Cao, and R. Lu, Efficient Password- Based Authentication and Key Exchange Scheme Preserving User Privacy, WASA'06, LNCS 4138, pp. 467-477, 2006
4 W.C. Ku, C.M. Chen, and H.L. Lee, Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme, IEICE Trans. Commun., Vol. E86-B, No. 5, pp. 1682-1684, 2003
5 E.J. Yoon, K.Y. Yoo, More efficient and secure remote user authentication scheme using smart cards, IEEE ICPADS'05, Vol. 2, pp. 73-77, 2005
6 M.L. Das, A. Saxena, V.P. Gulati, A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, Vol. 50, No.2, pp. 629-631, 2004   DOI   ScienceOn
7 H.Y. Chien, C.H. Chen, A Remote Authentication Scheme Preserving User Anonymity, IEEE AINA'05, Vol. 2, pp. 245-248 , 2005
8 L. Hu, Y. Yang, X. Niu, Improved Remote User Authentication Scheme Preserving User Anonymity, IEEE CNSR'07, pp. 323-328, 2007