DocumentCode
1700550
Title
Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement Scheme
Author
Chang, Ya-Fen ; Lin, Jhih-Yi ; Yen, Yuo-Ju
Author_Institution
Dept. of Comput. Sci. & Inf. Eng., Nat. Taichung Inst. of Technol., Taichung, Taiwan
fYear
2011
Firstpage
168
Lastpage
171
Abstract
Lots applications need involved parties to share common session keys for specific requirements. For example, the shared key can be the seed to determine locations to hide secret data into an image. Wang et al. proposed an authentication scheme with key agreement based on the elliptic curve discrete logarithm problem in 2011. They claimed that their scheme had seven advantages. (1) A verification table is not required in the server. (2) The client´s password can be changed easily, and the server cannot obtain the client´s password. (3) Their scheme could resist all well-known security threats. (4) No time synchronization is needed. (5)The client and the server can share a common session key. (6) Their scheme is efficient and practical. (7) Their scheme can protect the privacy of the client´s secret information. After we analyze Wang et al.´s scheme thoroughly, we find that their scheme suffers from three threats. In this paper, we will show the perceived security threats of Wang et al.´s scheme in detail.
Keywords
client-server systems; message authentication; public key cryptography; client password; client secret information privacy; elliptic curve discrete logarithm problem; image hiding; key agreement scheme; secret data hiding; secret key privacy preserving authentication; security threats; Authentication; Bismuth; Law; Servers; Smart cards; anthentication; password; smart card;
fLanguage
English
Publisher
ieee
Conference_Titel
Genetic and Evolutionary Computing (ICGEC), 2011 Fifth International Conference on
Conference_Location
Xiamen
Print_ISBN
978-1-4577-0817-6
Electronic_ISBN
978-0-7695-4449-6
Type
conf
DOI
10.1109/ICGEC.2011.48
Filename
6042743
Link To Document