2015
DOI: 10.1002/sec.1299
|View full text |Cite
|
Sign up to set email alerts
|

An enhanced privacy preserving remote user authentication scheme with provable security

Abstract: Very recently, Kumari et al. proposed a symmetric key and smart card‐based remote user password authentication scheme to enhance Chung et al.'s scheme. They claimed their enhanced scheme to provide anonymity while resisting all known attacks. In this paper, we analyze that Kumari et al.'s scheme is still vulnerable to anonymity violation attack as well as smart card stolen attack. Then we propose a supplemented scheme to overcome security weaknesses of Kumari et al.'s scheme. We have analyzed the security of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
8
1

Relationship

5
4

Authors

Journals

citations
Cited by 76 publications
(37 citation statements)
references
References 46 publications
0
37
0
Order By: Relevance
“…The session key (13) computed by the adversary is equal to the session key established between MN and FA, because…”
Section: Session Key Disclosurementioning
confidence: 99%
“…The session key (13) computed by the adversary is equal to the session key established between MN and FA, because…”
Section: Session Key Disclosurementioning
confidence: 99%
“…Since the sensitive patient information is transmitted through an open channel, so there is a big concern of message security against various types of active and passive attacks. To make secure communication between medical professional and patient, user authentication with session key agreement protocols [1,2,3,4,5] are widely used. In such protocols, after sharing a common session research articles suggested different solutions, but still none of the solutions are sufficient to provide known security features as discussed in the Sections 1.1 and 1.2.…”
Section: Introductionmentioning
confidence: 99%
“…In order to design a secure authentication scheme [7,12,15], many researchers used different cryptographic tools such as hash function [3,4,8], chaotic maps [23], RSA cryptosystem [16], elliptic curve cryptography (ECC) [9], bilinear pairing [1,22], ElGamal and some others operation like XOR and concatentation. It is known that both public key cryptosystem such as (ECC) and RSA provide same level of security.…”
Section: Introductionmentioning
confidence: 99%