Publication | Closed Access
Untraceable dynamic‐identity‐based remote user authentication scheme with verifiable password update
91
Citations
17
References
2013
Year
Summary PeopleAuthentication AuthorizationDevice AuthenticationEngineeringAuthentication ProtocolSpecific User ActivitiesInformation SecurityVerifiable Password UpdateIdentity-based SecurityData PrivacyComputer ScienceVerifier TableAuthentication Access ControlPrivacyData SecurityCryptography
People are always concerned about privacy, and techniques that trace specific user activities can seriously damage that privacy. The authors propose a dynamic‑identity‑based remote user authentication scheme to protect user privacy. The scheme uses smart cards for mutual authentication without a verifier table. The scheme ensures transmitted identities are always fresh, guaranteeing untraceability and allowing users to change passwords after authentication. © 2013 John Wiley & Sons, Ltd.
SUMMARY People are always concerned about privacy. Techniques tracing specific user activities may damage privacy seriously. To protect user privacy, a dynamic‐identity‐based remote user authentication scheme will be proposed in this manuscript. This scheme employs smart cards to achieve mutual authentication, and no verifier table is needed. Via this scheme, transmitted identities are always fresh such that untraceability is ensured, and a user can change his or her password after being authenticated successfully. Copyright © 2013 John Wiley & Sons, Ltd.
| Year | Citations | |
|---|---|---|
Page 1
Page 1