2015
DOI: 10.1016/j.ins.2015.03.070
|View full text |Cite
|
Sign up to set email alerts
|

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
58
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 136 publications
(58 citation statements)
references
References 60 publications
0
58
0
Order By: Relevance
“…The scheme in [25] is the first one that defines a formal model to capture the feature of user untraceability, and that highlights the damaging threat of de-synchronization attacks on privacy-preserving two-factor authentication schemes. The schemes in [26][27][28][29], and [30] use elliptic curve cryptography (ECC) to generate a shared key with the server.…”
Section: Related Workmentioning
confidence: 99%
“…The scheme in [25] is the first one that defines a formal model to capture the feature of user untraceability, and that highlights the damaging threat of de-synchronization attacks on privacy-preserving two-factor authentication schemes. The schemes in [26][27][28][29], and [30] use elliptic curve cryptography (ECC) to generate a shared key with the server.…”
Section: Related Workmentioning
confidence: 99%
“…Typically, only when the _ was "camouflaged" by random numbers or other special parameters which only the user and the server can get can the scheme resist Attack II, such as [11,14,55]. So how can we conceal the _ and those sensitive parameters?…”
Section: Solutions To Offline Dictionary Attack Via Verificationmentioning
confidence: 99%
“…In 1991, Chang and Wu [10] also developed a scheme using smart card for storing sensitive information to help the authentication. Since then, smart cards have been applied to user authentication schemes widely, and some notable ones include [11][12][13][14]. Furthermore, these years many schemes used biometrics characteristic as an additional factor to provide the authentication [15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, this risk has also been revealed in [30,31], who refer to the de-synchronization weakness of the schemes in [37,38], yet no practical solution to manage this type of problem has been discovered. Lastly, the authors in [39] proposed a good scheme that can process this threat while staying efficient and accomplishing provable security. On an ongoing basis, our proposed scheme can support user anonymity based on generating one time keys for each user's login.…”
Section: Comparisonmentioning
confidence: 99%