2022
DOI: 10.1155/2022/1943426
|View full text |Cite|
|
Sign up to set email alerts
|

A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server

Abstract: Everyone desires to avail online services provided by different service providers securely, efficiently, and effectively. In this regard, security is still a significant concern for them. However, no one guarantees secure communication by browsing different applications remotely. To ensure confidentiality, authorization, availability, nonrepudiation, and removing eavesdropping, without a robust authentication scheme, nothing will go right. Therefore, we attempted to design a robust and privacy-preserving authe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 61 publications
0
6
0
Order By: Relevance
“…For example, the scheme [39] is vulnerable to replay attacks, while the schemes [40,41] have traceability issues. Finally, the author [42] proposed an anonymous authentication scheme for mobile devices in a public cloud server. Te scheme [42] achieved all the security vulnerabilities of the scheme [43], and the communication and computation costs are also less.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the scheme [39] is vulnerable to replay attacks, while the schemes [40,41] have traceability issues. Finally, the author [42] proposed an anonymous authentication scheme for mobile devices in a public cloud server. Te scheme [42] achieved all the security vulnerabilities of the scheme [43], and the communication and computation costs are also less.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Finally, the author [42] proposed an anonymous authentication scheme for mobile devices in a public cloud server. Te scheme [42] achieved all the security vulnerabilities of the scheme [43], and the communication and computation costs are also less. In the end, we identify some faws in the scheme [2], and these faws are discussed in detail under:…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, some of these cryptographic techniques are not secure against quantum attacks. The authors of [1] proposed an authentication scheme for a public cloud server environment that achieved all known security goals but was not much feasible for the quantum computing era. Some existing proposed schemes are not efficient against quantum attacks and are vulnerable to known security attacks, for example, the schemes [2][3][4][5][6][7][8][9][10][11][12][13] suffer from offline password attacks, while the schemes [5,6,10,[13][14][15][16][17][18][19][20][21] cannot provide anonymity.…”
Section: Network Modelmentioning
confidence: 99%
“…In public cloud servers, Naveed et al [31] charted a protocol that provides user anonymity, untraceability, perfect forward secrecy, and resistance to replay attacks. Again, non-traceability is the problem, as one-voter-one-vote cannot be assured.…”
Section: State Of the Artmentioning
confidence: 99%