For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme
SeongHan SHIN Kazukuni KOBARA
IEICE TRANSACTIONS on Information and Systems
Publication Date: 2018/03/01
Online ISSN: 1745-1361
Type of Manuscript: LETTER
Category: Information Network
password, authentication, user anonymity,
Full Text: PDF(113.1KB)
>>Buy this Article
A purpose of password-based anonymous authentication schemes is to provide not only password-based authentication but also user anonymity. In , Yang et al., proposed a password-based anonymous authentication scheme (we call it YZWB10 scheme) using the password-protected credentials. In this paper, we discuss user anonymity of the YZWB10 scheme  against a third-party attacker, who is much weaker than a malicious server. First, we show that a third-party attacker in the YZWB10 scheme can specify which user actually sent the login request to the server. This attack also indicates that the attacker can link different login requests to be sent later by the same user. Second, we give an effective countermeasure to this attack which does not require any security for storing users' password-protected credentials.