A New Remote Authentication Scheme for Anonymous Users Using ECC
- 10.2991/3ca-13.2013.36How to use a DOI?
- anonymity; authentication; ID-based; ECC
In 2011, Khan et al. identified that Wang et al. scheme could not achieve user anonymity and had many practical pitfalls, In addition, Khan et al. presented an enhanced scheme to eliminate the aforementioned defects. In this article, we point out that Khan et al.’s scheme is incapable to provide user anonymity and suffers from forgery attack, off-line password guessing attack. Besides, a new authentication scheme for anonymous users using elliptic curves cryptosystem is presented, which could withstand various types of network attacks and is more suitable for mobile application scenarios where resources constrained and security concerned.
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Dianli Guo AU - Fengtong Wen PY - 2013/04 DA - 2013/04 TI - A New Remote Authentication Scheme for Anonymous Users Using ECC BT - Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation PB - Atlantis Press SP - 143 EP - 146 SN - 1951-6851 UR - https://doi.org/10.2991/3ca-13.2013.36 DO - 10.2991/3ca-13.2013.36 ID - Guo2013/04 ER -