Abstract
In 2004, Wu-Hsu proposed an efficient identification scheme preserving anonymity. However, Yang et al. showed that Wu-Hsu’s scheme has a serious weakness, by which the service provider can learn the secret token of the user who requests services. To overcome this limitation, they further proposed a scheme to attain the same set of objectives as the previous works. Nevertheless, the two schemes still have other serious weaknesses. Accordingly, the current paper demonstrates the vulnerability of the two schemes. Furthermore, we present a method to avoid attack.
Keywords
Download to read the full chapter text
Chapter PDF
References
Lee, W.B., Chang, C.C.: User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Network. Computer Systems Science and Engineering 15(4), 113–116 (2000)
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signature and Public-key Cryptosystem. Commun. ACM 21(2), 120–126 (1978)
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Inc., Chichester (1996)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Wu, T.S., Hsu, C.L.: Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks. Computer & Security 23(2), 120–125 (2004)
Yang, Y.J., Wang, S.H., Bao, F., Wang, J., Deng, R.H.: New Efficient User Identification and Key Distribution Scheme Providing Enhanced Security. Computer & Security 23(8), 697–704 (2004)
Lin, C.L., Hwang, T.: A Password Authentication Scheme with Secure Password Updating. Computers & Security 22(1), 68–72 (2003)
Yang, C.C., Chang, T.Y., Li, J.W.: Security Enhancement for Protecting Password Transmission. IEICE Transactions on Communications E86-B(7), 2178–2181 (2003)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yoon, EJ., Yoo, KY. (2005). Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. In: Qing, S., Mao, W., López, J., Wang, G. (eds) Information and Communications Security. ICICS 2005. Lecture Notes in Computer Science, vol 3783. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11602897_27
Download citation
DOI: https://doi.org/10.1007/11602897_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30934-5
Online ISBN: 978-3-540-32099-9
eBook Packages: Computer ScienceComputer Science (R0)