An efficient and practicable anonymous authentication scheme using smart cards

Recently, many smart card-based anonymous authentication schemes have been proposed to preserve user's anonymity. Unfortunately, most of these schemes do not achieve to preserve user's anonymity from the malicious user. In 2008, Kim et al. proposed a scheme which not only guaranteed user privacy but also provided traceable anonymity authentication. In this paper, we first point out that Kim et al.'s scheme still does not provide user anonymity as they claimed, then we highlight the inherent design flaw of Kim et al.'s scheme and the previous ones failing to protect user's anonymity. Finally an efficient anonymous authentication scheme is proposed to solve these aforementioned problems.

[1]  Hung-Yu Chien,et al.  A remote authentication scheme preserving user anonymity , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[2]  Dong Hoon Lee,et al.  Cryptanalysis of Two Improved Remote User Authentication Schemes Preserving User Anonymity , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[3]  C. Bindu,et al.  Improved Remote User Authentication Scheme Preserving User Anonymity , 2008 .

[4]  Dong Hoon Lee,et al.  Anonymous and Traceable Authentication Scheme using Smart Cards , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[5]  Hung-Yu Chien,et al.  An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..

[6]  Hung-Min Sun,et al.  An Efficient Remote User Authentication Scheme Using Smart Cards , 2000 .

[7]  Hung-Min Sun,et al.  An efficient remote use authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[8]  Chin-Chen Chang,et al.  Remote password authentication with smart cards , 1991 .

[9]  Cheng-Chi Lee,et al.  Security enhancement for a dynamic ID-based remote user authentication scheme , 2005, International Conference on Next Generation Web Services Practices (NWeSP'05).

[10]  Ashutosh Saxena,et al.  A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.