On the security of a dynamic identity-based remote user authentication scheme with verifiable password update

Yongchun Liu, Peng Gong*, Xiaopeng Yan, Ping Li

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

Recently, Chang et al. [Chang Y, Tai W, Chang H. Untraceable dynamic identity-based remote user authentication scheme with verifiable password update. International Journal of Communication Systems 2013; doi:10.1002/dac.2552] proposed a dynamic identity-based remote user authentication scheme with verifiable password update. They also proved that their scheme could withstand various attacks. Unfortunately, by proposing concrete attacks, we show that their scheme is vulnerable to three kinds of attacks. We also point out that their scheme cannot provide untraceability. The analysis shows that the scheme of Chang et al. is not suitable for practical applications.

Original languageEnglish
Pages (from-to)842-847
Number of pages6
JournalInternational Journal of Communication Systems
Volume28
Issue number5
DOIs
Publication statusPublished - 25 Mar 2015

Keywords

  • Authentication
  • Dynamic identity
  • Password
  • Privacy
  • Traceability

Fingerprint

Dive into the research topics of 'On the security of a dynamic identity-based remote user authentication scheme with verifiable password update'. Together they form a unique fingerprint.

Cite this