2019
DOI: 10.1155/2019/4656281
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient ECC-Based Anonymous Authentication Protocol

Abstract: Nowadays, remote user authentication protocol plays a great role in ensuring the security of data transmission and protecting the privacy of users for various network services. In this study, we discover two recently introduced anonymous authentication schemes are not as secure as they claimed, by demonstrating they suffer from offline password guessing attack, desynchronization attack, session key disclosure attack, failure to achieve user anonymity, or forward secrecy. Besides, we reveal two environment-spec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 36 publications
0
16
0
Order By: Relevance
“…Recently, data transmission and protection of the user from various security attacks, the user authentication Wireless Communications and Mobile Computing protocol plays an integral role in ensuring security. Wang et al [28] discovered two authentication security schemes that are not fully claimed and fail to provide secure communication, such as password guessing, session key disclosure, impersonation assaults, and user anonymity. In [28] eliminated the security threats from the existing scheme.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, data transmission and protection of the user from various security attacks, the user authentication Wireless Communications and Mobile Computing protocol plays an integral role in ensuring security. Wang et al [28] discovered two authentication security schemes that are not fully claimed and fail to provide secure communication, such as password guessing, session key disclosure, impersonation assaults, and user anonymity. In [28] eliminated the security threats from the existing scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al [28] discovered two authentication security schemes that are not fully claimed and fail to provide secure communication, such as password guessing, session key disclosure, impersonation assaults, and user anonymity. In [28] eliminated the security threats from the existing scheme. The proposed improved authentication scheme based on the elliptic curve cryptosystem, performing analysis, proves that security scheme in [28] was better than existing schemes in terms of security, computation cost, and communication cost.…”
Section: Related Workmentioning
confidence: 99%
“…BAN logic is constantly improved in application. Today, BAN logic is still used as a verification tool for security protocols or authentication protocols in radio frequency identification systems [13], Internet of things systems [14,15], and remote authentication protocols [16].…”
Section: Related Workmentioning
confidence: 99%
“…Related Works. Since Lamport [4] presented the first password authentication scheme, a large number of schemes [5][6][7][8][9][10][11][12][13][14][15][16][17][18] that are applicable to different scenarios, adopt differ-ent cryptosystems, and employ different kinds of authentication factors were presented. In 2001, Li et al [17] presented the first multiserver authentication scheme, in which the user can register once and then access multiple servers with a pair of identity and password.…”
Section: Introductionmentioning
confidence: 99%