2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing 2014
DOI: 10.1109/dasc.2014.31
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues of Chen et al.'s Dynamic ID-Based Authentication Scheme

Abstract: Chen et al. proposed in 2012, a dynamic ID-based authentication scheme for Telecare Medical Information Systems. Chen et al. preferred simpler computations unlike previous schemes proposed for TMIS, so they designed a computational complexity-free protocol. But it entails many security concerns. Here we show that an adversary can cheat the lawful participants of the scheme, can compute the agreed upon session-key; which renders the communication between the participants as un-confidential. We further illustrat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…But adversary may obtain the ID and other massages to disguise as a user to log into the remote systems. And many static ID-based remote user authentications can't provide users with the convenience of password change or verify the validity of the login requests without any verify Table. To overcome these risks and improve the efficiency and security, many applications and researches [12][13][14][15][16][17][18][19][20][21] based on dynamic ID have been done. And owing to the features of portability, low cost, cryptographic and computational capacity, the smart cards are used in the scheme of authentication on a large scale.…”
Section: Introductionmentioning
confidence: 99%
“…But adversary may obtain the ID and other massages to disguise as a user to log into the remote systems. And many static ID-based remote user authentications can't provide users with the convenience of password change or verify the validity of the login requests without any verify Table. To overcome these risks and improve the efficiency and security, many applications and researches [12][13][14][15][16][17][18][19][20][21] based on dynamic ID have been done. And owing to the features of portability, low cost, cryptographic and computational capacity, the smart cards are used in the scheme of authentication on a large scale.…”
Section: Introductionmentioning
confidence: 99%