Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks

被引:5
|
作者
Shi, Run-hua [1 ]
Zhong, Hong [1 ]
Zhang, Shun [1 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei 230601, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2015年 / 71卷 / 11期
基金
中国国家自然科学基金;
关键词
Authentication; Key agreement; Elliptic curve cryptography; Client-server network;
D O I
10.1007/s11227-015-1496-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent papers (J Supercomput 66(2):973-988, 2013; J Supercomput 69(1):395-411, 2014), the authors presented two efficient identity-based authenticated key agreement schemes for mobile client-server networks, respectively. In this letter, we show that there is a serious security flaw in the user registration phase of the two schemes: any authorized user can impersonate the server to generate an effective private key of any other user. We then present a suggestion to overcome the problem without losing any good features of the original schemes.
引用
收藏
页码:4015 / 4018
页数:4
相关论文
共 50 条