Abstract
Recently, Chang et al. [Chang Y, Tai W, Chang H. Untraceable dynamic identity-based remote user authentication scheme with verifiable password update. International Journal of Communication Systems 2013; doi:10.1002/dac.2552] proposed a dynamic identity-based remote user authentication scheme with verifiable password update. They also proved that their scheme could withstand various attacks. Unfortunately, by proposing concrete attacks, we show that their scheme is vulnerable to three kinds of attacks. We also point out that their scheme cannot provide untraceability. The analysis shows that the scheme of Chang et al. is not suitable for practical applications.
Original language | English |
---|---|
Pages (from-to) | 842-847 |
Number of pages | 6 |
Journal | International Journal of Communication Systems |
Volume | 28 |
Issue number | 5 |
DOIs | |
Publication status | Published - 25 Mar 2015 |
Keywords
- Authentication
- Dynamic identity
- Password
- Privacy
- Traceability