DocumentCode :
2524835
Title :
Optimization of User Identification Scheme with Preserving User Anonymity
Author :
Sajjadi Jahromi, S. Hossein ; Jahromi, M. Hossein Mehraban
Author_Institution :
Neyriz Branch, Islamic Azad Univ., Neyriz, Iran
fYear :
2010
fDate :
10-12 Sept. 2010
Firstpage :
462
Lastpage :
466
Abstract :
Anonymity is a fine security characteristic for supplying user identification and key agreement along the user´s login operation. Hsu and Chuang recently suggest A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks. This paper presents a weakness of security that is found in Hsu and Chuang protocol. It is shown that this protocol attacker can freely impersonate the user or service provider. This occurs because an attacker can get the secret key of user (or the service provider) after successful execution of the key generation phase. It is shown a progress to improve and repair the security flaws of the Hsu and Chuang protocol and suggest that the proposed scheme is secure reply attack, impersonation attack and deniable of service(DoS).
Keywords :
computer network security; identification; optimisation; Chuang; Hsu; deniable of service; distributed computer network; impersonation attack; key distribution preserving user anonymity; security flaw; service provider; user identification scheme; user login operation; Anonymity; Deniable of Service; Key Agreement; Key Distribution; Mutual Identification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mechanical and Electrical Technology (ICMET), 2010 2nd International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-8100-2
Electronic_ISBN :
978-1-4244-8102-6
Type :
conf
DOI :
10.1109/ICMET.2010.5598404
Filename :
5598404
Link To Document :
بازگشت