Title :
Optimization of User Identification Scheme with Preserving User Anonymity
Author :
Sajjadi Jahromi, S. Hossein ; Jahromi, M. Hossein Mehraban
Author_Institution :
Neyriz Branch, Islamic Azad Univ., Neyriz, Iran
Abstract :
Anonymity is a fine security characteristic for supplying user identification and key agreement along the user´s login operation. Hsu and Chuang recently suggest A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks. This paper presents a weakness of security that is found in Hsu and Chuang protocol. It is shown that this protocol attacker can freely impersonate the user or service provider. This occurs because an attacker can get the secret key of user (or the service provider) after successful execution of the key generation phase. It is shown a progress to improve and repair the security flaws of the Hsu and Chuang protocol and suggest that the proposed scheme is secure reply attack, impersonation attack and deniable of service(DoS).
Keywords :
computer network security; identification; optimisation; Chuang; Hsu; deniable of service; distributed computer network; impersonation attack; key distribution preserving user anonymity; security flaw; service provider; user identification scheme; user login operation; Anonymity; Deniable of Service; Key Agreement; Key Distribution; Mutual Identification;
Conference_Titel :
Mechanical and Electrical Technology (ICMET), 2010 2nd International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-8100-2
Electronic_ISBN :
978-1-4244-8102-6
DOI :
10.1109/ICMET.2010.5598404