首页    期刊浏览 2024年09月15日 星期日
登录注册

文章基本信息

  • 标题:WEAKNESSES AND IMPROVEMENT OF HSU-CHUANG’S USER IDENTIFICATION SCHEME
  • 本地全文:下载
  • 作者:Tsai ; Jia-Lun
  • 期刊名称:Information Technology And Control
  • 印刷版ISSN:2335-884X
  • 出版年度:2015
  • 卷号:39
  • 期号:1
  • 语种:English
  • 出版社:Kaunas University of Technology
  • 摘要:In 2004, Yang et al. proposed an efficient user identification scheme with key distribution. The scheme provides user anonymity, so it is possible for the user to anonymously login the remote server. Unfortunately, Mangipudi and Katti found that Yang et al.’s scheme suffers from a Denial-of-Service (DoS) attack and then proposed an improvement of Yang et al.’s scheme. However, Hsu and Chuang demonstrated that Mangipudi-Katti’s scheme is vulnerable to an identity disclosure attack, and further proposed a novel user identification scheme with key distribution preserving user anonymity for distributed computer networks. They claimed that their scheme can achieve the following advantages: (1) user anonymity, (2) key distribution, (3) mutual authentication, and (4) key confirm. In this study, the author shows that Hsu-Chuang’s scheme is vulnerable to three impersonation attacks. Then, the improvement of Hsu-Chuang’s scheme is proposed.
国家哲学社会科学文献中心版权所有