Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.6.191

Security analysis of Chang-Lee-Chiu's anonymous authentication scheme  

Youn, Taek-Young (Korea University)
Park, Young-Ho (Sejong Cyber University)
Abstract
Recently, an anonymous authentication scheme has been proposed by Chang, Lee, and Chiu. In this paper, we show the insecurity of the scheme. To prove the insecurity of the scheme, we describe some attacks that can be used to recover an user's identity.
Keywords
Security; Anonymity; Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C.C. Lee, M.S. Hwang, and I.E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments," IEEE Trans. Industrial Electron, vol. 53, no. 5, pp. 1683-1687, Oct. 2006   DOI   ScienceOn
2 C.C. Wu, W.B. Lee, and W.J. Tsaur, "A Secure Authentication Scheme with Anonymity for Wireless Communications," IEEE Communications Letters, vol. 12, no. 10, pp. 722-723, Oct. 2008   DOI   ScienceOn
3 L. Buttyan, C. Gbaguidi, S. Staamann, and U. Wilhelm, "Extensions to an authentication technique proposed for the global mobility network," IEEE Transactions on Communications, vol. 48, no. 3, pp. 373-376, Mar. 2000   DOI   ScienceOn
4 J. Zhu and J. Ma, "A new authentication scheme with anonymity for wireless environments," IEEE Trans. Consumer Electron, vol. 50, no. 1, pp. 230-234, Feb. 2004
5 C.C. Chang, C.Y. Lee, and Y.C. Chiu, "Enhanced authentication scheme with anonymity for roaming service in global mobility networks," Computer Communications, vol. 32, issue. 4, pp. 611-618, Mar. 2009   DOI   ScienceOn