Title: Secure user-identification and key distribution scheme preserving anonymity

Authors: S. Tripathy, S. Nandi

Addresses: ABV – Indian Institute of Information Technology and Management Gwalior, Morena Link Road, Gwalior, India. ' Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati

Abstract: User-identification and key distribution with preserving anonymity is an important issue for remote access. Yang et al. proposed an efficient user identification and key distribution scheme preserving user anonymity. In this paper, we show the vulnerabilities of Yang|s scheme against forgery and impersonation attacks. Further, we propose a highly secured protocol upholding the same properties.

Keywords: user authentication; key distribution; user anonymity; vulnerability; user identification; forgery; impersonation attacks; network security; security protocols.

DOI: 10.1504/IJSN.2008.020094

International Journal of Security and Networks, 2008 Vol.3 No.3, pp.201 - 205

Published online: 26 Aug 2008 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article