Comments on an advanced dynamic ID-based authentication scheme for Cloud Computing

24Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The design of secure remote user authentication schemes for mobile devices in Cloud Computing is still an open and quite challenging problem, though many such schemes have been published lately. Recently, Chen et al. pointed out that Yang and Chang's ID-based authentication scheme based on elliptic curve cryptography (ECC) is vulnerable to various attacks, and then presented an improved password based authentication scheme using ECC to overcome the drawbacks. Based on heuristic security analysis, Chen et al. claimed that their scheme is more secure and can withstand all related attacks. In this paper, however, we show that Chen et al.'s scheme cannot achieve the claimed security goals and report its flaws: (1) It is vulnerable to offline password guessing attack; (2) It fails to preserve user anonymity; (3) It is prone to key compromise impersonation attack; (4) It suffers from the clock synchronization problem. The cryptanalysis demonstrates that the scheme under study is unfit for practical use in Cloud Computing environment. © Springer-Verlag Berlin Heidelberg 2012.

Cite

CITATION STYLE

APA

Wang, D., Mei, Y., Ma, C. G., & Cui, Z. S. (2012). Comments on an advanced dynamic ID-based authentication scheme for Cloud Computing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7529 LNCS, pp. 246–253). https://doi.org/10.1007/978-3-642-33469-6_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free